[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[   27.594421] kauditd_printk_skb: 8 callbacks suppressed
[   27.594433] audit: type=1800 audit(1541565309.635:29): pid=5554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0
[   27.628511] audit: type=1800 audit(1541565309.635:30): pid=5554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.10.31' (ECDSA) to the list of known hosts.
2018/11/07 04:35:26 fuzzer started
2018/11/07 04:35:28 dialing manager at 10.128.0.26:33665
2018/11/07 04:35:29 syscalls: 1
2018/11/07 04:35:29 code coverage: enabled
2018/11/07 04:35:29 comparison tracing: enabled
2018/11/07 04:35:29 setuid sandbox: enabled
2018/11/07 04:35:29 namespace sandbox: enabled
2018/11/07 04:35:29 Android sandbox: /sys/fs/selinux/policy does not exist
2018/11/07 04:35:29 fault injection: enabled
2018/11/07 04:35:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2018/11/07 04:35:29 net packed injection: enabled
2018/11/07 04:35:29 net device setup: enabled
04:38:03 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0)
syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000080)="f20f2d7e00c4e3bd40ce630f07f7cd0c000000660f01c90ff8cd0fc7588ab8ad6e00000f23d80f21f835000000c00f23f8c4e3cd6971f500f20f08", 0x3b}], 0x1, 0x0, &(0x7f0000000040), 0x0)

syzkaller login: [  201.067152] IPVS: ftp: loaded support on port[0] = 21
04:38:03 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005})
ioctl$TUNSETLINK(r1, 0x400454cd, 0x306)
ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1})

[  201.381782] IPVS: ftp: loaded support on port[0] = 21
04:38:03 executing program 2:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = semget$private(0x0, 0x0, 0x0)
semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0)
r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c)
semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237)
getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14)
accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90)
socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000))

[  201.716123] IPVS: ftp: loaded support on port[0] = 21
04:38:04 executing program 3:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0)
lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17)

[  202.128392] IPVS: ftp: loaded support on port[0] = 21
[  202.503222] bridge0: port 1(bridge_slave_0) entered blocking state
[  202.530555] bridge0: port 1(bridge_slave_0) entered disabled state
[  202.538139] device bridge_slave_0 entered promiscuous mode
04:38:04 executing program 4:
setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, <r0=>0x0})
ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096)
syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400)
ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209)
clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff)
ptrace$peekuser(0x3, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7})
socket$vsock_stream(0x28, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff})
close(r1)
openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0)
io_setup(0x4, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}])

[  202.733483] bridge0: port 2(bridge_slave_1) entered blocking state
[  202.758989] bridge0: port 2(bridge_slave_1) entered disabled state
[  202.766694] device bridge_slave_1 entered promiscuous mode
[  202.850102] IPVS: ftp: loaded support on port[0] = 21
[  202.898608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  203.043661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
04:38:05 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
close(r1)

[  203.410413] IPVS: ftp: loaded support on port[0] = 21
[  203.485059] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  203.507042] bridge0: port 1(bridge_slave_0) entered blocking state
[  203.550144] bridge0: port 1(bridge_slave_0) entered disabled state
[  203.557676] device bridge_slave_0 entered promiscuous mode
[  203.582713] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  203.688213] bridge0: port 2(bridge_slave_1) entered blocking state
[  203.713120] bridge0: port 2(bridge_slave_1) entered disabled state
[  203.721967] device bridge_slave_1 entered promiscuous mode
[  203.735051] bridge0: port 1(bridge_slave_0) entered blocking state
[  203.757568] bridge0: port 1(bridge_slave_0) entered disabled state
[  203.780414] device bridge_slave_0 entered promiscuous mode
[  203.874357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  203.912664] bridge0: port 2(bridge_slave_1) entered blocking state
[  203.922521] bridge0: port 2(bridge_slave_1) entered disabled state
[  203.949944] device bridge_slave_1 entered promiscuous mode
[  203.998958] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  204.098732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  204.236849] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  204.292068] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  204.303026] team0: Port device team_slave_0 added
[  204.320874] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  204.424805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  204.437464] team0: Port device team_slave_1 added
[  204.470384] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  204.564158] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  204.593129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  204.619410] bridge0: port 1(bridge_slave_0) entered blocking state
[  204.640365] bridge0: port 1(bridge_slave_0) entered disabled state
[  204.649273] device bridge_slave_0 entered promiscuous mode
[  204.706308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  204.774126] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  204.792745] bridge0: port 2(bridge_slave_1) entered blocking state
[  204.813907] bridge0: port 2(bridge_slave_1) entered disabled state
[  204.821598] device bridge_slave_1 entered promiscuous mode
[  204.845311] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  204.874287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  204.892493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  204.949427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  204.956557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  204.970952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  205.023918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  205.041483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  205.048361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  205.139124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  205.163483] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  205.175751] team0: Port device team_slave_0 added
[  205.296063] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  205.309693] team0: Port device team_slave_1 added
[  205.361438] bridge0: port 1(bridge_slave_0) entered blocking state
[  205.367816] bridge0: port 1(bridge_slave_0) entered disabled state
[  205.380222] device bridge_slave_0 entered promiscuous mode
[  205.423118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  205.434516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  205.449957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  205.494867] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  205.510435] team0: Port device team_slave_0 added
[  205.518360] bridge0: port 2(bridge_slave_1) entered blocking state
[  205.539950] bridge0: port 2(bridge_slave_1) entered disabled state
[  205.547365] device bridge_slave_1 entered promiscuous mode
[  205.561588] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  205.585382] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  205.600453] team0: Port device team_slave_1 added
[  205.620946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  205.662196] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  205.690813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  205.717351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  205.739829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  205.750287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  205.801770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  205.830510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  205.861132] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  205.868319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  205.890868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  205.958140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  206.023875] bridge0: port 1(bridge_slave_0) entered blocking state
[  206.045566] bridge0: port 1(bridge_slave_0) entered disabled state
[  206.061304] device bridge_slave_0 entered promiscuous mode
[  206.081778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  206.121179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  206.139466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  206.162325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  206.184949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  206.199752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  206.234374] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  206.252292] bridge0: port 2(bridge_slave_1) entered blocking state
[  206.258730] bridge0: port 2(bridge_slave_1) entered disabled state
[  206.269916] device bridge_slave_1 entered promiscuous mode
[  206.350488] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  206.412252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  206.456420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  206.468125] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  206.519830] team0: Port device team_slave_0 added
[  206.526893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  206.560345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  206.639551] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  206.650946] team0: Port device team_slave_1 added
[  206.726970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  206.820530] bridge0: port 2(bridge_slave_1) entered blocking state
[  206.827046] bridge0: port 2(bridge_slave_1) entered forwarding state
[  206.834056] bridge0: port 1(bridge_slave_0) entered blocking state
[  206.840460] bridge0: port 1(bridge_slave_0) entered forwarding state
[  206.848787] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  206.899387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  207.003075] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  207.030506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  207.041879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  207.059709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  207.069672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  207.088563] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  207.097137] team0: Port device team_slave_0 added
[  207.125123] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  207.175615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  207.190342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  207.200748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  207.219150] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  207.226710] team0: Port device team_slave_1 added
[  207.285584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  207.293671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  207.381708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  207.388573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  207.399698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  207.449058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  207.456700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  207.532113] bridge0: port 2(bridge_slave_1) entered blocking state
[  207.538544] bridge0: port 2(bridge_slave_1) entered forwarding state
[  207.545286] bridge0: port 1(bridge_slave_0) entered blocking state
[  207.551705] bridge0: port 1(bridge_slave_0) entered forwarding state
[  207.585651] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  207.618555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  207.641279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  207.661394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  207.774271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  207.796589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  207.806878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  207.840638] bridge0: port 2(bridge_slave_1) entered blocking state
[  207.847042] bridge0: port 2(bridge_slave_1) entered forwarding state
[  207.853790] bridge0: port 1(bridge_slave_0) entered blocking state
[  207.860217] bridge0: port 1(bridge_slave_0) entered forwarding state
[  207.872789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  207.882765] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  207.901791] team0: Port device team_slave_0 added
[  207.919415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  207.931546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  207.959711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  208.049722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  208.059001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  208.069950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  208.077350] team0: Port device team_slave_1 added
[  208.177605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  208.184812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  208.203113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  208.308332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  208.316284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  208.334734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  208.394821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  208.409198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  208.429469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  208.539306] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  208.546541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  208.567741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  208.755382] bridge0: port 2(bridge_slave_1) entered blocking state
[  208.761848] bridge0: port 2(bridge_slave_1) entered forwarding state
[  208.768504] bridge0: port 1(bridge_slave_0) entered blocking state
[  208.774936] bridge0: port 1(bridge_slave_0) entered forwarding state
[  208.799919] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  209.073006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  209.540975] bridge0: port 2(bridge_slave_1) entered blocking state
[  209.547389] bridge0: port 2(bridge_slave_1) entered forwarding state
[  209.554126] bridge0: port 1(bridge_slave_0) entered blocking state
[  209.560538] bridge0: port 1(bridge_slave_0) entered forwarding state
[  209.599701] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  209.914726] bridge0: port 2(bridge_slave_1) entered blocking state
[  209.921164] bridge0: port 2(bridge_slave_1) entered forwarding state
[  209.927835] bridge0: port 1(bridge_slave_0) entered blocking state
[  209.934299] bridge0: port 1(bridge_slave_0) entered forwarding state
[  209.951630] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  210.084483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  210.094942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  212.552530] 8021q: adding VLAN 0 to HW filter on device bond0
[  213.002807] 8021q: adding VLAN 0 to HW filter on device bond0
[  213.117666] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  213.180625] 8021q: adding VLAN 0 to HW filter on device bond0
[  213.442332] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  213.627927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  213.647299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  213.657763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  213.693806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  214.010154] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  214.016320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  214.029590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  214.062771] 8021q: adding VLAN 0 to HW filter on device bond0
[  214.104562] 8021q: adding VLAN 0 to HW filter on device team0
[  214.186068] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  214.207131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  214.222963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  214.510207] 8021q: adding VLAN 0 to HW filter on device team0
[  214.569753] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  214.664724] 8021q: adding VLAN 0 to HW filter on device team0
[  215.082259] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  215.088429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  215.096865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  215.158228] 8021q: adding VLAN 0 to HW filter on device bond0
[  215.250077] 8021q: adding VLAN 0 to HW filter on device bond0
[  215.532853] 8021q: adding VLAN 0 to HW filter on device team0
[  215.687420] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  215.723109] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  216.168660] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  216.194341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  216.210309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  216.232621] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  216.252922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  216.264872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  216.629542] 8021q: adding VLAN 0 to HW filter on device team0
[  216.730415] 8021q: adding VLAN 0 to HW filter on device team0
[  217.309442] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.
04:38:19 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4)

04:38:19 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005})
ioctl$TUNSETLINK(r1, 0x400454cd, 0x306)
ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1})

[  217.651345] hrtimer: interrupt took 33980 ns
04:38:19 executing program 2:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = semget$private(0x0, 0x0, 0x0)
semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0)
r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c)
semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237)
getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14)
accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90)
socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000))

04:38:19 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005})
ioctl$TUNSETLINK(r1, 0x400454cd, 0x306)
ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1})

04:38:19 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4)

04:38:20 executing program 2:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = semget$private(0x0, 0x0, 0x0)
semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0)
r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c)
semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237)
getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14)
accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90)
socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000))

04:38:20 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4)

04:38:20 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005})
ioctl$TUNSETLINK(r1, 0x400454cd, 0x306)
ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1})

04:38:20 executing program 2:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = semget$private(0x0, 0x0, 0x0)
semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/173)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0)
r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
move_pages(0x0, 0x1, &(0x7f0000000ac0)=[&(0x7f0000def000/0x3000)=nil], 0x0, &(0x7f00000001c0), 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @mcast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}], 0x3c)
semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000340)=""/237)
getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1)
setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x62eb, 0xffffffffffffffff}, 0x14)
accept$unix(r3, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90)
socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000))

04:38:20 executing program 3:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0)
lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17)

04:38:21 executing program 4:
setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, <r0=>0x0})
ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096)
syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400)
ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209)
clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff)
ptrace$peekuser(0x3, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7})
socket$vsock_stream(0x28, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff})
close(r1)
openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0)
io_setup(0x4, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}])

04:38:21 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000180)=0x4)

04:38:21 executing program 3:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0)
lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17)

04:38:21 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
close(r1)

04:38:21 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
close(r1)

04:38:21 executing program 3:
creat(&(0x7f00000000c0)='./file0\x00', 0x0)
lsetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0)
lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00000003c0)=""/23, 0x17)

04:38:21 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
r1 = syz_open_pts(r0, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
close(r1)

04:38:21 executing program 4:
setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, <r0=>0x0})
ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096)
syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400)
ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209)
clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff)
ptrace$peekuser(0x3, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7})
socket$vsock_stream(0x28, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff})
close(r1)
openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0)
io_setup(0x4, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}])

04:38:21 executing program 4:
setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, <r0=>0x0})
ptrace$getregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000240)=""/4096)
syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x400)
ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001240)=""/209)
clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff)
ptrace$peekuser(0x3, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x5, 0x0, 0xba, 0x7})
socket$vsock_stream(0x28, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff})
close(r1)
openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x10121102, 0x0)
io_setup(0x4, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000000)="10000000060000000000000000000000", 0x10}])

04:38:24 executing program 1:
r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socket$nl_route(0x10, 0x3, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00')
preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)

04:38:24 executing program 4:
mkdir(&(0x7f0000000380)='./bus\x00', 0x0)
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[])
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]})

04:38:24 executing program 3:
r0 = socket$inet(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0)

04:38:24 executing program 2:
r0 = getpgrp(0x0)
r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d)
ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0)

04:38:24 executing program 0:
syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040))

04:38:24 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070")
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000180)=""/157, 0x9d}], 0x1, &(0x7f0000001a00)=""/189, 0xbd}, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@remote, 0x0, 0x0, 0x0, 0xe}, 0xfffffffffffffdc0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20)
r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00')
preadv(r2, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/102, 0x3c}, {&(0x7f0000000580)=""/172}, {&(0x7f0000000640)=""/190}, {&(0x7f0000000700)=""/78}, {&(0x7f0000000780)=""/110}, {&(0x7f0000000800)=""/151}], 0x304, 0x0)

04:38:24 executing program 0:
syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040))

[  222.287974] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'.
[  222.321245] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size.
04:38:24 executing program 3:
r0 = socket$inet(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0)

[  222.395777] overlayfs: filesystem on './bus' not supported as upperdir
04:38:24 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="6601669b0f35c4e1fe16846ba49e0000b9940200000f32c4c23dad78e0b9670900000f32660f38827f95b0040f01d10fc71a", 0x32}], 0x1, 0x0, &(0x7f0000000040), 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x0, &(0x7f0000000140)=[@dstype3={0x7, 0x7}], 0x1)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  222.438989] ntfs: (device loop4): parse_options(): Unrecognized mount option upperdir.
04:38:24 executing program 1:
r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socket$nl_route(0x10, 0x3, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00')
preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)

04:38:24 executing program 0:
syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040))

[  222.547854] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'.
[  222.576261] ntfs: (device loop4): parse_options(): Unrecognized mount option workdir.
04:38:24 executing program 0:
syz_emit_ethernet(0x72, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0xc, 0x6, 0x3, 0x0, [{[@multicast1]}]}]}}, @gre}}}}, &(0x7f0000000040))

[  222.634295] ntfs: (device loop4): parse_options(): Unrecognized mount option lowerdir.
04:38:24 executing program 3:
r0 = socket$inet(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0)

04:38:24 executing program 4:
mkdir(&(0x7f0000000380)='./bus\x00', 0x0)
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[])
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]})

04:38:24 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x9)
mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))

[  222.851943] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'.
[  223.005766] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size.
04:38:25 executing program 2:
r0 = getpgrp(0x0)
r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d)
ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0)

04:38:25 executing program 1:
r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socket$nl_route(0x10, 0x3, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00')
preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)

04:38:25 executing program 5:
r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xa)
syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180))
socket(0x11, 0x0, 0x0)
r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ion\x00', 0x7, 0x0)
ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, <r2=>0xffffffffffffffff})
mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x811, r2, 0x4000000)
write$P9_RLERRORu(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1700000007029a28397f36d7000000000000000000000065992eb2519311d4880b0eb8ed3ccd997fe412d114ca52c59a3992d5e2073d66677bdd15062f878e6d813699835da7bcb5705e59ee9af0e25c418772a149adb8972864986ec41d63e9066639723f11205fa48c9aeb258abbe2848c4a17d12e228a42133ccc4a9f9545ad1a44d8c2d39fbb77a1acd5a596ee204093bd3be54459ea1caba30230ddb2e99d589297d534b62286fda3f98093979629a9c4ea5a08d862be971ec5aea2657eea7857b033320391f32c5f09400cf53fef5d971844b4d63d2ac9403d3108b1c0a05e56ce0c565702b0da1d0ba42eb4552a9933d06d"], 0xf5)
syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00')

04:38:25 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x9)
mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))

04:38:25 executing program 3:
r0 = socket$inet(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010207031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b3562406b20cd37ed01cc00000000000000000000000000000", 0x4c}], 0x1}, 0x0)

04:38:25 executing program 4:
mkdir(&(0x7f0000000380)='./bus\x00', 0x0)
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[])
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]})

[  223.303938] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size.
[  223.315066] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'.
04:38:25 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x9)
mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))

04:38:25 executing program 1:
r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socket$nl_route(0x10, 0x3, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=""/194, 0xc2}}], 0x1, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_tables_targets\x00')
preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)

04:38:25 executing program 4:
mkdir(&(0x7f0000000380)='./bus\x00', 0x0)
syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[])
mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}, 0x5c}]})

04:38:25 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4)
ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings})
close(r2)
close(r1)

04:38:25 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000000a000)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x9)
mount(&(0x7f000091dff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))

04:38:25 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0)

[  223.828008] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size.
04:38:26 executing program 2:
r0 = getpgrp(0x0)
r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d)
ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0)

04:38:26 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4)
ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings})
close(r2)
close(r1)

04:38:26 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000200)={0x77, 0x0, [0x4b564d01, 0x1, 0xc0010007]})

04:38:26 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0)

04:38:26 executing program 0:
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0)
clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil)

04:38:26 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3)
ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"})

04:38:26 executing program 0:
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0)
clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil)

04:38:26 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3)
ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"})

04:38:26 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0)

04:38:26 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4)
ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings})
close(r2)
close(r1)

04:38:26 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3)
ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"})

04:38:26 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
sendmmsg(r0, &(0x7f0000006380)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000000580)=@in={0x2, 0x0, @multicast2}, 0xd, &(0x7f00000004c0), 0x0, &(0x7f0000000080)}}], 0x800000000000046, 0x0)

04:38:27 executing program 2:
r0 = getpgrp(0x0)
r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0)
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
write$cgroup_pid(r2, &(0x7f00000000c0), 0xfffffc2d)
ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0)

04:38:27 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]})
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8)

04:38:27 executing program 0:
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0)
clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil)

04:38:27 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4)
ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000140)=@ethtool_gstrings})
close(r2)
close(r1)

04:38:27 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6(0xa, 0x3, 0x3)
ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070")
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={"6c6f3a0100"})

04:38:27 executing program 1:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
unshare(0x400)
getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14)

04:38:27 executing program 0:
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0)
clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
prctl$setmm(0x26, 0x1, &(0x7f0000ffd000/0x3000)=nil)

04:38:27 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000)
ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe)
msgget(0x3, 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0)
r2 = accept$alg(r0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840))
r3 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58)
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20)
r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0)
write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x179)
io_setup(0x3ff, &(0x7f0000000040)=<r6=>0x0)
sendfile(r1, r5, &(0x7f0000000100), 0x54)
io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}])
syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8)
fdatasync(r5)

04:38:27 executing program 1:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
unshare(0x400)
getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14)

04:38:27 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100))

[  225.283467] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option ""
04:38:27 executing program 0:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000005c0)="0a5c2d0240316285717070")
creat(&(0x7f0000000100)='./file0\x00', 0x0)
syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x5, 0x0)
clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f0000000040), &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000))
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={<r1=>0x0})
ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000080)={r1, 0x2})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x10, 0xffffffffffffffff, 0x0)
getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4)

04:38:27 executing program 1:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
unshare(0x400)
getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14)

[  225.481797] rpcbind: RPC call returned error 22
[  225.529365] rpcbind: RPC call returned error 22
04:38:28 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]})
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8)

04:38:28 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100))

04:38:28 executing program 0:
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00)
connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r2 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0)

04:38:28 executing program 1:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
unshare(0x400)
getsockopt$inet6_mreq(r0, 0x29, 0x4d, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14)

04:38:28 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000)
ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe)
msgget(0x3, 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0)
r2 = accept$alg(r0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840))
r3 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58)
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20)
r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0)
write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x179)
io_setup(0x3ff, &(0x7f0000000040)=<r6=>0x0)
sendfile(r1, r5, &(0x7f0000000100), 0x54)
io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}])
syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8)
fdatasync(r5)

04:38:28 executing program 2:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3, 0xfeda)
r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x0)
ioctl$BLKROSET(r0, 0x125d, &(0x7f00000002c0)=0x80)
perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc)
sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xf30e020000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280))
getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00')
mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0)

04:38:28 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4)
sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0)
write(r1, &(0x7f0000000380)="e71a3827c2", 0x5)

04:38:28 executing program 0:
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00)
connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r2 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0)

04:38:28 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100))

[  226.053276] atomic_op 00000000d6fcd7ac conn xmit_atomic           (null)
[  226.102332] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option ""
04:38:28 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]})
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8)

04:38:28 executing program 3:
syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x4, 0x800, 0x6, 0x4, 0x0, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000100))

04:38:28 executing program 0:
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00)
connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r2 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0)

[  226.252861] atomic_op 00000000bd384f8c conn xmit_atomic           (null)
04:38:28 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4)
sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0)
write(r1, &(0x7f0000000380)="e71a3827c2", 0x5)

04:38:28 executing program 3:
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00)
connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r2 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0)

04:38:28 executing program 0:
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00)
connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r2 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0)

[  226.411946] atomic_op 00000000fa1b3f4d conn xmit_atomic           (null)
04:38:28 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4)
sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0)
write(r1, &(0x7f0000000380)="e71a3827c2", 0x5)

04:38:28 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000)
ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe)
msgget(0x3, 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0)
r2 = accept$alg(r0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840))
r3 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58)
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20)
r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0)
write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x179)
io_setup(0x3ff, &(0x7f0000000040)=<r6=>0x0)
sendfile(r1, r5, &(0x7f0000000100), 0x54)
io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}])
syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8)
fdatasync(r5)

[  226.468813] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option ""
[  226.508587] atomic_op 000000005086af45 conn xmit_atomic           (null)
[  226.610940] atomic_op 0000000075d11cec conn xmit_atomic           (null)
04:38:28 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80))
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10})
r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0)
ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1})
syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00')
close(r1)

04:38:28 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
recvfrom(r2, &(0x7f0000000040)=""/203, 0xcb, 0x2, &(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x707000)
setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0)=0x4, 0x4)
sendmmsg(r1, &(0x7f0000000000)=[{}], 0x400000000000234, 0x0)
write(r1, &(0x7f0000000380)="e71a3827c2", 0x5)

04:38:28 executing program 3:
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00)
connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r2 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0)

04:38:28 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000440)={[{@jqfmt_vfsold='jqfmt=vfsold'}]})
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000006c0), &(0x7f0000000700)=0x8)

04:38:28 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84)

04:38:29 executing program 3:
syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0xa00)
connect$rds(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r2 = socket$rds(0x15, 0x5, 0x0)
bind$rds(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000840), 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f0000000e80), &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x58}, 0x0)

[  226.953577] atomic_op 00000000006d9222 conn xmit_atomic           (null)
04:38:29 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x301000)
ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000240)=0xac)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe)
msgget(0x3, 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0)
r2 = accept$alg(r0, 0x0, 0x0)
recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x200009ff}], 0x2, &(0x7f0000000ec0)=""/210, 0x9e}}], 0x1, 0x0, &(0x7f0000004840))
r3 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58)
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x9, 0x0, 0x2, 0x0, 0x7f, 0x4, 0x2cb6}, &(0x7f0000000400)=0x20)
r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0)
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0)
write$binfmt_misc(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x179)
io_setup(0x3ff, &(0x7f0000000040)=<r6=>0x0)
sendfile(r1, r5, &(0x7f0000000100), 0x54)
io_submit(r6, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r4, &(0x7f0000000000), 0xfffffce4}])
syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x0)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), &(0x7f0000000300)=0x8)
fdatasync(r5)

04:38:29 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84)

04:38:29 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)

[  227.153325] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option ""
[  227.195024] atomic_op 000000009e4e3957 conn xmit_atomic           (null)
04:38:29 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84)

04:38:29 executing program 3:
r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0)
fcntl$setstatus(r0, 0x4, 0x2c00)
readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)

04:38:29 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)

04:38:29 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80))
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10})
r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0)
ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1})
syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00')
close(r1)

04:38:29 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6}, &(0x7f0000000000)=0x84)

04:38:29 executing program 3:
r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0)
fcntl$setstatus(r0, 0x4, 0x2c00)
readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)

04:38:29 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0)
fcntl$setstatus(r0, 0x4, 0x2c00)
readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)

04:38:29 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)

04:38:29 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80))
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10})
r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0)
ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1})
syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00')
close(r1)

04:38:29 executing program 3:
r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0)
fcntl$setstatus(r0, 0x4, 0x2c00)
readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)

04:38:29 executing program 0:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246)

04:38:29 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0)
fcntl$setstatus(r0, 0x4, 0x2c00)
readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)

04:38:29 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80))
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10})
r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0)
ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1})
syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00')
close(r1)

04:38:29 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc)

04:38:29 executing program 3:
r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0)
fcntl$setstatus(r0, 0x4, 0x2c00)
readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)

04:38:29 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80))
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10})
r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0)
ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1})
syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00')
close(r1)

04:38:30 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0)
fcntl$setstatus(r0, 0x4, 0x2c00)
readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1)

04:38:30 executing program 3:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140))

04:38:30 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x11, 0xa, 0x300)
r0 = socket$kcm(0xa, 0x522000000003, 0x11)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13)
sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0)

04:38:30 executing program 0:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246)

04:38:30 executing program 5:
rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8)

04:38:30 executing program 3:
r0 = socket$inet6(0xa, 0x803, 0x3)
ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000000)={'gre0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}})

04:38:30 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80))
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10})
r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0)
ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1})
syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00')
close(r1)

04:38:30 executing program 4:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xffffffffffffffeb)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000a80))
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000b00)={0x0, 0x10})
r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xe15, 0x0)
ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000100)={0x5, 0x2, 0x1})
syz_open_procfs(0x0, &(0x7f0000000ac0)='coredump_filter\x00')
close(r1)

04:38:30 executing program 5:
rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8)

04:38:30 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0)
syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1})

04:38:30 executing program 0:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246)

04:38:30 executing program 5:
rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8)

04:38:30 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20)

04:38:30 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
mkdir(&(0x7f0000027000)='./file0\x00', 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff)
r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0)
truncate(&(0x7f0000000240)='./file0\x00', 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r1, &(0x7f0000000140), 0x8800000)
clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080))
mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}})
fcntl$addseals(r0, 0x409, 0x8)

04:38:30 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x11, 0xa, 0x300)
r0 = socket$kcm(0xa, 0x522000000003, 0x11)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13)
sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0)

04:38:30 executing program 5:
rt_sigtimedwait(&(0x7f0000000100), &(0x7f0000000140), 0xffffffffffffffff, 0x8)

04:38:30 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0)
syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1})

04:38:30 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20)

[  228.896351] 9pnet: p9_fd_create_tcp (7815): problem connecting socket to -27.0.0.1
04:38:31 executing program 0:
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote}, 0x20)
r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0)
ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246)

04:38:31 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070")
syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281)

04:38:31 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0)
syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1})

[  229.065549] 9pnet: p9_fd_create_tcp (7806): problem connecting socket to -27.0.0.1
04:38:31 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20)

04:38:31 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070")
syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281)

04:38:31 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x11, 0xa, 0x300)
r0 = socket$kcm(0xa, 0x522000000003, 0x11)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13)
sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0)

04:38:31 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c)
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4, &(0x7f0000000080)={@loopback}, 0x20)

04:38:31 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
mkdir(&(0x7f0000027000)='./file0\x00', 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff)
r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0)
truncate(&(0x7f0000000240)='./file0\x00', 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r1, &(0x7f0000000140), 0x8800000)
clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080))
mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}})
fcntl$addseals(r0, 0x409, 0x8)

04:38:31 executing program 3:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x10}}, 0x165}}, 0x0)
syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffff921, 0x8000)
ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000002c0)={@mcast1})

04:38:31 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070")
syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281)

04:38:31 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x4)
write$binfmt_misc(r0, &(0x7f0000000000)={'syz0'}, 0x4)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001500199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1)

[  229.423463] 9pnet: p9_fd_create_tcp (7854): problem connecting socket to -27.0.0.1
04:38:31 executing program 4:
r0 = socket(0xa, 0x1, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60)

04:38:31 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0)
r1 = socket$inet(0x2, 0x800000000000a, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000140)={{0x2}})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
clone(0x0, &(0x7f0000000340), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000140))
ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0145401, &(0x7f0000000140))

04:38:31 executing program 5:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070")
syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4281)

[  229.570969] syz-executor0 uses obsolete (PF_INET,SOCK_PACKET)
04:38:31 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
mkdir(&(0x7f0000027000)='./file0\x00', 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff)
r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0)
truncate(&(0x7f0000000240)='./file0\x00', 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r1, &(0x7f0000000140), 0x8800000)
clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080))
mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}})
fcntl$addseals(r0, 0x409, 0x8)

04:38:31 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$kcm(0x11, 0xa, 0x300)
r0 = socket$kcm(0xa, 0x522000000003, 0x11)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13)
sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0)
perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0)

04:38:31 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0)
r1 = socket$inet(0x2, 0x800000000000a, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000140)={{0x2}})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
clone(0x0, &(0x7f0000000340), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000140))
ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0145401, &(0x7f0000000140))

04:38:31 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x4)
write$binfmt_misc(r0, &(0x7f0000000000)={'syz0'}, 0x4)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001500199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1)

04:38:31 executing program 4:
r0 = socket(0xa, 0x1, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60)

04:38:31 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00')
flock(r0, 0xffffffffffffffff)
preadv(r1, &(0x7f0000000480), 0x100000000000021c, 0x0)

04:38:31 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
mkdir(&(0x7f0000027000)='./file0\x00', 0x0)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff)
r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0)
truncate(&(0x7f0000000240)='./file0\x00', 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r1, r1, &(0x7f0000000140), 0x8800000)
clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080))
mount$9p_tcp(&(0x7f0000000180)='-27.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000480)={'trans=tcp,', {'port'}})
fcntl$addseals(r0, 0x409, 0x8)

[  229.877370] 9pnet: p9_fd_create_tcp (7886): problem connecting socket to -27.0.0.1
04:38:31 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x4)
write$binfmt_misc(r0, &(0x7f0000000000)={'syz0'}, 0x4)
r1 = socket$inet6_udplite(0xa, 0x2, 0x88)
ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070")
writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001500199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1)

[  229.982307] kasan: CONFIG_KASAN_INLINE enabled
[  229.986945] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  230.005551] kasan: CONFIG_KASAN_INLINE enabled
[  230.018373] kasan: CONFIG_KASAN_INLINE enabled
[  230.023126] kasan: GPF could be caused by NULL-ptr deref or user memory access
04:38:32 executing program 4:
r0 = socket(0xa, 0x1, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60)

[  230.034960] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[  230.041217] CPU: 1 PID: 5690 Comm: udevd Not tainted 4.20.0-rc1-next-20181107+ #107
[  230.049021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  230.058424] RIP: 0010:locks_remove_flock+0x216/0x350
[  230.063543] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40
04:38:32 executing program 4:
r0 = socket(0xa, 0x1, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x1, 0x9e8, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000040), &(0x7f0000000580)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, "2c6f7365000b0000000054f139580800", 'veth0\x00', 'syzkaller0\x00', 'ifb0\x00', @dev, [], @empty, [], 0x928, 0x928, 0x958, [@devgroup={'devgroup\x00', 0x18}, @among={'among\x00', 0x850, {{0x0, 0x7ff, 0x0, {[], 0x3, [{[], @local}, {}, {[], @multicast1}]}, {[], 0x1, [{[], @local}]}}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0xa60)

[  230.082448] RSP: 0018:ffff8801bab5f880 EFLAGS: 00010202
[  230.087818] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d
[  230.095106] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb
[  230.102382] RBP: ffff8801bab5fa60 R08: ffff8801ba9c8240 R09: ffffed003b5e5b67
[  230.109662] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c938fac0
[  230.116960] R13: ffff8801bab5f8f8 R14: 1ffff1003756bf13 R15: dffffc0000000000
[  230.124243] FS:  00007fef5230a7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000
04:38:32 executing program 4:
syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @loopback, @broadcast, @dev}}}}, &(0x7f0000000080))

[  230.132472] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  230.138353] CR2: 00007ffe14bf2c40 CR3: 00000001d8be1000 CR4: 00000000001406e0
[  230.145625] Call Trace:
[  230.148256]  ? flock_lock_inode+0x11c0/0x11c0
[  230.152771]  ? mark_held_locks+0x130/0x130
[  230.157053]  ? __handle_mm_fault+0xa57/0x5be0
[  230.161570]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  230.167121]  ? locks_remove_posix+0x486/0x850
[  230.171625]  ? vfs_lock_file+0xe0/0xe0
[  230.172821] kasan: GPF could be caused by NULL-ptr deref or user memory access
04:38:32 executing program 4:
syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @loopback, @broadcast, @dev}}}}, &(0x7f0000000080))

[  230.175520]  ? lock_downgrade+0x900/0x900
[  230.175540]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  230.175557]  locks_remove_file+0x148/0x5c0
[  230.175574]  ? fcntl_setlk+0xfc0/0xfc0
[  230.189754] kobject: 'loop4' (00000000163f2ab8): kobject_uevent_env
[  230.192622]  ? fsnotify_first_mark+0x350/0x350
[  230.196857] kobject: 'loop4' (00000000163f2ab8): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  230.200731]  ? __fsnotify_parent+0xcc/0x420
[  230.200745]  ? perf_trace_sched_process_exec+0x860/0x860
[  230.200758]  ? fsnotify+0xf20/0xf20
[  230.200775]  ? __might_sleep+0x95/0x190
[  230.226211] kasan: CONFIG_KASAN_INLINE enabled
[  230.230935]  __fput+0x2f0/0xa70
[  230.230967]  ? get_max_files+0x20/0x20
[  230.230983]  ? trace_hardirqs_on+0xbd/0x310
[  230.230999]  ? kasan_check_read+0x11/0x20
[  230.231018]  ? task_work_run+0x1af/0x2a0
[  230.262815]  ? trace_hardirqs_off_caller+0x300/0x300
[  230.267943]  ? filp_close+0x1cd/0x250
[  230.271750]  ____fput+0x15/0x20
[  230.275032]  task_work_run+0x1e8/0x2a0
[  230.278935]  ? task_work_cancel+0x240/0x240
[  230.283265]  ? copy_fd_bitmaps+0x210/0x210
[  230.287515]  ? do_syscall_64+0x9a/0x820
[  230.291510]  exit_to_usermode_loop+0x318/0x380
[  230.296115]  ? __bpf_trace_sys_exit+0x30/0x30
[  230.300616]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  230.306159]  do_syscall_64+0x6be/0x820
[  230.310057]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  230.315427]  ? syscall_return_slowpath+0x5e0/0x5e0
[  230.320359]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  230.325207]  ? trace_hardirqs_on_caller+0x310/0x310
[  230.330239]  ? prepare_exit_to_usermode+0x291/0x3b0
[  230.335260]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  230.340114]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  230.345306] RIP: 0033:0x7fef51a122b0
[  230.349023] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24
[  230.367930] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  230.375638] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0
[  230.382906] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007
[  230.390194] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080
[  230.397461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0
[  230.404728] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250
[  230.411998] Modules linked in:
[  230.415234] general protection fault: 0000 [#2] PREEMPT SMP KASAN
[  230.421491] CPU: 0 PID: 7889 Comm: syz-executor5 Tainted: G      D           4.20.0-rc1-next-20181107+ #107
[  230.431371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  230.440738] RIP: 0010:locks_remove_flock+0x216/0x350
[  230.445846] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40
[  230.464769] RSP: 0018:ffff880184e17880 EFLAGS: 00010202
[  230.470134] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d
[  230.477401] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb
[  230.484671] RBP: ffff880184e17a60 R08: ffff880184e08080 R09: ffffed003b5e5b67
[  230.491953] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c27345c0
[  230.499224] R13: ffff880184e178f8 R14: 1ffff100309c2f13 R15: dffffc0000000000
[  230.506496] FS:  0000000002706940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
[  230.514741] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  230.520628] CR2: 000000000072c000 CR3: 00000001bc3b3000 CR4: 00000000001406f0
[  230.527906] Call Trace:
[  230.530514]  ? flock_lock_inode+0x11c0/0x11c0
[  230.535015]  ? mark_held_locks+0x130/0x130
[  230.539264]  ? wake_up_new_task+0x6f7/0xcf0
[  230.543592]  ? exit_robust_list+0x280/0x280
[  230.547924]  ? lockdep_hardirqs_on+0x3bb/0x5b0
[  230.552512]  ? trace_hardirqs_on+0xbd/0x310
[  230.556849]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  230.562401]  ? locks_remove_posix+0x486/0x850
[  230.566913]  ? trace_hardirqs_off_caller+0x300/0x300
[  230.572029]  ? vfs_lock_file+0xe0/0xe0
[  230.575935]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  230.581477]  locks_remove_file+0x148/0x5c0
[  230.585716]  ? fcntl_setlk+0xfc0/0xfc0
[  230.589607]  ? fsnotify_first_mark+0x350/0x350
[  230.594211]  ? __fsnotify_parent+0xcc/0x420
[  230.598537]  ? perf_trace_sched_process_exec+0x860/0x860
[  230.603988]  ? fsnotify+0xf20/0xf20
[  230.607618]  ? __might_sleep+0x95/0x190
[  230.611598]  __fput+0x2f0/0xa70
[  230.614887]  ? get_max_files+0x20/0x20
[  230.618783]  ? trace_hardirqs_on+0xbd/0x310
[  230.623110]  ? kasan_check_read+0x11/0x20
[  230.627273]  ? task_work_run+0x1af/0x2a0
[  230.631338]  ? trace_hardirqs_off_caller+0x300/0x300
[  230.636446]  ? filp_close+0x1cd/0x250
[  230.640257]  ____fput+0x15/0x20
[  230.643542]  task_work_run+0x1e8/0x2a0
[  230.647435]  ? task_work_cancel+0x240/0x240
[  230.651758]  ? copy_fd_bitmaps+0x210/0x210
[  230.655998]  ? do_syscall_64+0x9a/0x820
[  230.659990]  exit_to_usermode_loop+0x318/0x380
[  230.664576]  ? __bpf_trace_sys_exit+0x30/0x30
[  230.669080]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  230.674632]  do_syscall_64+0x6be/0x820
[  230.678527]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  230.683895]  ? syscall_return_slowpath+0x5e0/0x5e0
[  230.688832]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  230.693700]  ? trace_hardirqs_on_caller+0x310/0x310
[  230.698747]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  230.703768]  ? prepare_exit_to_usermode+0x291/0x3b0
[  230.708797]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  230.713651]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  230.718838] RIP: 0033:0x411021
[  230.722037] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  230.740941] RSP: 002b:00007ffd7529c5b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  230.748646] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021
[  230.755911] RDX: 0000000000000001 RSI: 0000000000730ac0 RDI: 0000000000000003
[  230.763195] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  230.770461] R10: 00007ffd7529c4e0 R11: 0000000000000293 R12: 0000000000000000
[  230.777739] R13: 0000000000000001 R14: 0000000000000017 R15: 0000000000000005
[  230.785029] Modules linked in:
[  230.788244] general protection fault: 0000 [#3] PREEMPT SMP KASAN
[  230.794501] CPU: 1 PID: 5691 Comm: udevd Tainted: G      D           4.20.0-rc1-next-20181107+ #107
[  230.799494] kobject: 'loop4' (00000000163f2ab8): kobject_uevent_env
[  230.803691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  230.813278] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  230.819438] RIP: 0010:locks_remove_flock+0x216/0x350
[  230.819454] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40
[  230.819462] RSP: 0018:ffff8801be6a7880 EFLAGS: 00010202
[  230.819474] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d
[  230.819482] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb
[  230.819491] RBP: ffff8801be6a7a60 R08: ffff8801cd79a280 R09: ffffed003b5e5b67
[  230.819500] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801bafec040
[  230.819514] R13: ffff8801be6a78f8 R14: 1ffff10037cd4f13 R15: dffffc0000000000
[  230.828505] kobject: 'loop4' (00000000163f2ab8): fill_kobj_path: path = '/devices/virtual/block/loop4'
[  230.831963] FS:  00007fef5230a7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000
[  230.831972] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  230.831981] CR2: 0000001b31c2b000 CR3: 00000001d86ed000 CR4: 00000000001406e0
[  230.831990] Call Trace:
[  230.832009]  ? flock_lock_inode+0x11c0/0x11c0
[  230.832030]  ? mark_held_locks+0x130/0x130
[  230.934873]  ? __handle_mm_fault+0xa57/0x5be0
[  230.939373]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  230.944912]  ? locks_remove_posix+0x486/0x850
[  230.949421]  ? vfs_lock_file+0xe0/0xe0
[  230.953311]  ? lock_downgrade+0x900/0x900
[  230.957464]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  230.963009]  locks_remove_file+0x148/0x5c0
[  230.967252]  ? fcntl_setlk+0xfc0/0xfc0
[  230.971148]  ? fsnotify_first_mark+0x350/0x350
[  230.975733]  ? __fsnotify_parent+0xcc/0x420
[  230.980058]  ? perf_trace_sched_process_exec+0x860/0x860
[  230.985509]  ? fsnotify+0xf20/0xf20
[  230.989144]  ? __might_sleep+0x95/0x190
[  230.993125]  __fput+0x2f0/0xa70
[  230.996412]  ? get_max_files+0x20/0x20
[  231.000306]  ? trace_hardirqs_on+0xbd/0x310
[  231.004633]  ? kasan_check_read+0x11/0x20
[  231.008794]  ? task_work_run+0x1af/0x2a0
[  231.012871]  ? trace_hardirqs_off_caller+0x300/0x300
[  231.017995]  ? filp_close+0x1cd/0x250
[  231.021800]  ____fput+0x15/0x20
[  231.025091]  task_work_run+0x1e8/0x2a0
[  231.028979]  ? task_work_cancel+0x240/0x240
[  231.033300]  ? copy_fd_bitmaps+0x210/0x210
[  231.037534]  ? do_syscall_64+0x9a/0x820
[  231.041514]  exit_to_usermode_loop+0x318/0x380
[  231.046120]  ? __bpf_trace_sys_exit+0x30/0x30
[  231.050624]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  231.056183]  do_syscall_64+0x6be/0x820
[  231.060095]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  231.065481]  ? syscall_return_slowpath+0x5e0/0x5e0
[  231.070413]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  231.075260]  ? trace_hardirqs_on_caller+0x310/0x310
[  231.080280]  ? prepare_exit_to_usermode+0x3b0/0x3b0
[  231.085301]  ? prepare_exit_to_usermode+0x291/0x3b0
[  231.090323]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  231.095180]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  231.100370] RIP: 0033:0x7fef51a122b0
[  231.104093] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24
[  231.122996] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  231.130708] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0
[  231.137981] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007
[  231.145250] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080
[  231.152520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0
[  231.159786] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250
[  231.167082] Modules linked in:
[  231.170302] general protection fault: 0000 [#4] PREEMPT SMP KASAN
[  231.176555] CPU: 0 PID: 7886 Comm: syz-executor2 Tainted: G      D           4.20.0-rc1-next-20181107+ #107
[  231.186444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  231.195816] RIP: 0010:__x86_indirect_thunk_rbx+0x10/0x20
[  231.201276] Code: 90 0f ae e8 eb f9 48 89 04 24 c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 e8 07 00 00 00 f3 90 0f ae e8 eb f9 48 89 1c 24 <c3> 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 e8 07 00 00 00 f3
[  231.207088] kasan: CONFIG_KASAN_INLINE enabled
[  231.220191] RSP: 0018:ffff88018488f2b0 EFLAGS: 00010293
[  231.220204] RAX: ffff880184caa5c0 RBX: 08538b4811730443 RCX: ffffffff81ed555d
[  231.220212] RDX: 0000000000000000 RSI: ffffffff81ed5c9e RDI: ffff88018488f338
[  231.220220] RBP: ffff88018488f4a0 R08: ffff880184caa5c0 R09: ffffed00381dfc2a
[  231.220228] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801b8c43780
[  231.220237] R13: ffff88018488f338 R14: 1ffff10030911e5b R15: dffffc0000000000
[  231.220253] FS:  00007efcd7b3f700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
[  231.252989] 9pnet: p9_fd_create_tcp (7912): problem connecting socket to -27.0.0.1
[  231.259274] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  231.259283] CR2: 00007fff1e703808 CR3: 00000001bceca000 CR4: 00000000001406f0
[  231.259292] Call Trace:
[  231.259313]  ? locks_remove_flock+0x236/0x350
[  231.259329]  ? flock_lock_inode+0x11c0/0x11c0
[  231.259345]  ? kasan_check_read+0x11/0x20
[  231.259359]  ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170
[  231.259375]  ? rcu_softirq_qs+0x20/0x20
[  231.274687] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  231.274880]  ? unwind_dump+0x190/0x190
[  231.331865]  ? is_bpf_text_address+0xd3/0x170
[  231.336371]  ? kernel_text_address+0x79/0xf0
[  231.340805]  ? __kernel_text_address+0xd/0x40
[  231.345303]  ? __save_stack_trace+0x8d/0xf0
[  231.349657]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  231.355223]  locks_remove_file+0x148/0x5c0
[  231.359460]  ? fcntl_setlk+0xfc0/0xfc0
[  231.363344]  ? kasan_slab_free+0xe/0x10
[  231.367330]  ? fsnotify_first_mark+0x350/0x350
[  231.371933]  ? __fsnotify_parent+0xcc/0x420
[  231.376269]  ? perf_trace_sched_process_exec+0x860/0x860
[  231.381747]  ? fsnotify+0xf20/0xf20
[  231.385393]  ? __might_sleep+0x95/0x190
[  231.389379]  __fput+0x2f0/0xa70
[  231.392670]  ? get_max_files+0x20/0x20
[  231.396581]  ? trace_hardirqs_on+0xbd/0x310
[  231.400905]  ? kasan_check_read+0x11/0x20
[  231.405063]  ? task_work_run+0x1af/0x2a0
[  231.409129]  ? trace_hardirqs_off_caller+0x300/0x300
[  231.414231]  ? free_nsproxy+0x1aa/0x220
[  231.418223]  ? trace_hardirqs_off_caller+0x300/0x300
[  231.423332]  ____fput+0x15/0x20
[  231.426612]  task_work_run+0x1e8/0x2a0
[  231.430500]  ? task_work_cancel+0x240/0x240
[  231.434824]  ? switch_task_namespaces+0xb8/0xd0
[  231.439514]  do_exit+0x1ad1/0x26d0
[  231.443064]  ? mm_update_next_owner+0x990/0x990
[  231.447733]  ? graph_lock+0x270/0x270
[  231.451539]  ? __sigqueue_free.part.29+0x74/0x90
[  231.456297]  ? graph_lock+0x270/0x270
[  231.460098]  ? kmem_cache_free+0x24f/0x290
[  231.464337]  ? graph_lock+0x270/0x270
[  231.468140]  ? __sigqueue_free.part.29+0x74/0x90
[  231.472905]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  231.478456]  ? check_preemption_disabled+0x48/0x280
[  231.483480]  ? rcu_lockdep_current_cpu_online+0x1a4/0x210
[  231.489017]  ? rcu_pm_notify+0xc0/0xc0
[  231.492913]  ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20
[  231.498462]  ? fpu__initialize+0x101/0x740
[  231.502697]  ? kernel_fpu_begin+0x20/0x20
[  231.506848]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  231.512389]  ? check_preemption_disabled+0x48/0x280
[  231.517415]  ? rcu_lockdep_current_cpu_online+0x1a4/0x210
[  231.522958]  ? rcu_pm_notify+0xc0/0xc0
[  231.526853]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  231.531875]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  231.537415]  ? signal_setup_done+0xbb/0x2f0
[  231.541735]  ? set_current_blocked+0x40/0x40
[  231.546150]  ? do_signal+0x453/0x21c0
[  231.549968]  ? prepare_signal+0xe50/0xe50
[  231.554122]  ? setup_sigcontext+0x7d0/0x7d0
[  231.558456]  ? find_held_lock+0x36/0x1c0
[  231.562522]  ? exit_to_usermode_loop+0x8c/0x380
[  231.567198]  ? exit_to_usermode_loop+0x8c/0x380
[  231.571873]  do_group_exit+0x177/0x440
[  231.575764]  ? trace_hardirqs_on+0xbd/0x310
[  231.580085]  ? __ia32_sys_exit+0x50/0x50
[  231.584148]  ? trace_hardirqs_off_caller+0x300/0x300
[  231.589260]  ? trace_hardirqs_on+0xbd/0x310
[  231.593588]  __x64_sys_exit_group+0x3e/0x50
[  231.597931]  do_syscall_64+0x1b9/0x820
[  231.601822]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  231.607193]  ? syscall_return_slowpath+0x5e0/0x5e0
[  231.612126]  ? trace_hardirqs_on_caller+0x310/0x310
[  231.617144]  ? prepare_exit_to_usermode+0x291/0x3b0
[  231.622174]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  231.627031]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  231.632220] RIP: 0033:0x457569
[  231.635439] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  231.654352] RSP: 002b:00007efcd7b3e688 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[  231.662074] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000457569
[  231.669367] RDX: 0000000000457569 RSI: 00007efcd7b3e6c0 RDI: 000000000000000b
[  231.676637] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000
[  231.683903] R10: 0000000020000480 R11: 0000000000000246 R12: 00007efcd7b3f6d4
04:38:33 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0)
r1 = socket$inet(0x2, 0x800000000000a, 0x0)
ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000140)={{0x2}})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
clone(0x0, &(0x7f0000000340), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000140))
ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0xc0145401, &(0x7f0000000140))

[  231.691177] R13: 00000000004c2b2c R14: 00000000004d41c8 R15: 00000000ffffffff
[  231.698503] Modules linked in:
[  231.701740] general protection fault: 0000 [#5] PREEMPT SMP KASAN
[  231.708010] CPU: 1 PID: 7875 Comm: syz-executor1 Tainted: G      D           4.20.0-rc1-next-20181107+ #107
[  231.717892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  231.725455] kobject: 'loop0' (0000000012f4416b): kobject_uevent_env
[  231.727284] RIP: 0010:locks_remove_flock+0x216/0x350
[  231.727299] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40
[  231.727312] RSP: 0018:ffff8801850bf880 EFLAGS: 00010202
[  231.734134] kobject: 'loop0' (0000000012f4416b): fill_kobj_path: path = '/devices/virtual/block/loop0'
[  231.738810] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d
[  231.738819] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb
[  231.738827] RBP: ffff8801850bfa60 R08: ffff880185dbe380 R09: ffffed00381dfc2a
[  231.738836] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801bd4a5cc0
[  231.738844] R13: ffff8801850bf8f8 R14: 1ffff10030a17f13 R15: dffffc0000000000
[  231.738854] FS:  0000000000bfc940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000
[  231.738863] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  231.738877] CR2: 000000000297c914 CR3: 00000001d7c4d000 CR4: 00000000001406e0
[  231.771300] kasan: CONFIG_KASAN_INLINE enabled
[  231.772560] Call Trace:
[  231.772581]  ? flock_lock_inode+0x11c0/0x11c0
[  231.772602]  ? mark_held_locks+0x130/0x130
[  231.780129] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  231.787146]  ? __might_fault+0x1e0/0x1e0
[  231.787165]  ? _raw_spin_unlock+0x2c/0x50
[  231.787184]  ? __handle_mm_fault+0xa57/0x5be0
[  231.866182]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  231.871725]  ? locks_remove_posix+0x486/0x850
[  231.876222]  ? vfs_lock_file+0xe0/0xe0
[  231.880114]  ? finish_task_switch+0x1b4/0x920
[  231.884611]  ? __switch_to_asm+0x34/0x70
[  231.888674]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  231.894222]  locks_remove_file+0x148/0x5c0
[  231.898473]  ? fcntl_setlk+0xfc0/0xfc0
[  231.902368]  ? fsnotify_first_mark+0x350/0x350
[  231.906952]  ? __fsnotify_parent+0xcc/0x420
[  231.911275]  ? perf_trace_sched_process_exec+0x860/0x860
[  231.916728]  ? fsnotify+0xf20/0xf20
[  231.920361]  ? check_preemption_disabled+0x48/0x280
[  231.925405]  ? __might_sleep+0x95/0x190
[  231.929393]  __fput+0x2f0/0xa70
[  231.932688]  ? get_max_files+0x20/0x20
[  231.936589]  ? trace_hardirqs_on+0xbd/0x310
[  231.940914]  ? kasan_check_read+0x11/0x20
[  231.945079]  ? task_work_run+0x1af/0x2a0
[  231.949141]  ? trace_hardirqs_off_caller+0x300/0x300
[  231.954247]  ? filp_close+0x1cd/0x250
[  231.958067]  ____fput+0x15/0x20
[  231.961349]  task_work_run+0x1e8/0x2a0
[  231.965239]  ? task_work_cancel+0x240/0x240
[  231.969567]  ? copy_fd_bitmaps+0x210/0x210
[  231.973809]  exit_to_usermode_loop+0x318/0x380
[  231.978394]  ? __bpf_trace_sys_exit+0x30/0x30
[  231.982911]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  231.988486]  do_syscall_64+0x6be/0x820
[  231.992376]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  231.997758]  ? syscall_return_slowpath+0x5e0/0x5e0
[  232.002694]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  232.007541]  ? trace_hardirqs_on_caller+0x310/0x310
[  232.012573]  ? prepare_exit_to_usermode+0x291/0x3b0
[  232.017607]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  232.022472]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  232.028189] RIP: 0033:0x411021
[  232.031385] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
[  232.050284] RSP: 002b:00007ffd3b9038f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  232.058013] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021
[  232.065282] RDX: 0000001b31c20000 RSI: 0000000000000000 RDI: 0000000000000003
[  232.072548] RBP: 0000000000000000 R08: ffffffff8139bdc9 R09: 00000000c23dd2b3
[  232.080526] R10: 00007ffd3b903820 R11: 0000000000000293 R12: 0000000000000000
[  232.087794] R13: 0000000000000001 R14: 000000000000001b R15: 0000000000000001
[  232.095076]  ? __phys_addr+0x19/0x120
[  232.098875] Modules linked in:
[  232.102086] general protection fault: 0000 [#6] PREEMPT SMP KASAN
[  232.103070] kasan: CONFIG_KASAN_INLINE enabled
[  232.108362] CPU: 0 PID: 7377 Comm: udevd Tainted: G      D           4.20.0-rc1-next-20181107+ #107
[  232.122107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  232.125192] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  232.131469] RIP: 0010:locks_remove_flock+0x216/0x350
[  232.131483] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40
[  232.131497] RSP: 0018:ffff8801b8f6f880 EFLAGS: 00010202
[  232.168195] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d
[  232.175464] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb
[  232.182728] RBP: ffff8801b8f6fa60 R08: ffff8801c4d68400 R09: ffffed00381dfc2a
[  232.189993] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801d975f7c0
[  232.197261] R13: ffff8801b8f6f8f8 R14: 1ffff100371edf13 R15: dffffc0000000000
[  232.204535] FS:  00007fef5230a7a0(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
[  232.212772] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  232.218650] CR2: 00007ffe14bf2c40 CR3: 00000001d93e7000 CR4: 00000000001406f0
[  232.225913] Call Trace:
[  232.228515]  ? flock_lock_inode+0x11c0/0x11c0
[  232.233016]  ? mark_held_locks+0x130/0x130
[  232.237284]  ? __handle_mm_fault+0xa57/0x5be0
[  232.241783]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  232.247323]  ? locks_remove_posix+0x486/0x850
[  232.251818]  ? vfs_lock_file+0xe0/0xe0
[  232.255715]  ? lock_downgrade+0x900/0x900
[  232.259868]  ? kasan_check_read+0x11/0x20
[  232.264020]  ? ep_remove+0x533/0xa30
[  232.267739]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  232.273284]  locks_remove_file+0x148/0x5c0
[  232.277532]  ? fcntl_setlk+0xfc0/0xfc0
[  232.281425]  ? fsnotify_first_mark+0x350/0x350
[  232.286020]  ? __fsnotify_parent+0xcc/0x420
[  232.290354]  ? perf_trace_sched_process_exec+0x860/0x860
[  232.295815]  ? fsnotify+0xf20/0xf20
[  232.299452]  ? check_preemption_disabled+0x48/0x280
[  232.304490]  ? __might_sleep+0x95/0x190
[  232.308472]  __fput+0x2f0/0xa70
[  232.311759]  ? get_max_files+0x20/0x20
[  232.315651]  ? trace_hardirqs_on+0xbd/0x310
[  232.319982]  ? kasan_check_read+0x11/0x20
[  232.324138]  ? task_work_run+0x1af/0x2a0
[  232.328208]  ? trace_hardirqs_off_caller+0x300/0x300
[  232.333317]  ? filp_close+0x1cd/0x250
[  232.337132]  ____fput+0x15/0x20
[  232.340428]  task_work_run+0x1e8/0x2a0
[  232.344335]  ? task_work_cancel+0x240/0x240
[  232.348658]  ? copy_fd_bitmaps+0x210/0x210
[  232.352924]  exit_to_usermode_loop+0x318/0x380
[  232.357508]  ? __bpf_trace_sys_exit+0x30/0x30
[  232.362030]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  232.367581]  do_syscall_64+0x6be/0x820
[  232.371487]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  232.376857]  ? syscall_return_slowpath+0x5e0/0x5e0
[  232.381786]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  232.386629]  ? trace_hardirqs_on_caller+0x310/0x310
[  232.391655]  ? prepare_exit_to_usermode+0x291/0x3b0
[  232.396687]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  232.401535]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  232.406738] RIP: 0033:0x7fef51a122b0
[  232.410452] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24
[  232.429351] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  232.437071] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0
[  232.444339] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007
[  232.451607] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080
[  232.458883] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0
[  232.466188] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250
[  232.473461] Modules linked in:
[  232.476674] general protection fault: 0000 [#7] PREEMPT SMP KASAN
[  232.482942] CPU: 1 PID: 7188 Comm: udevd Tainted: G      D           4.20.0-rc1-next-20181107+ #107
[  232.492128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  232.501497] RIP: 0010:locks_remove_flock+0x216/0x350
[  232.506621] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40
[  232.511418] ---[ end trace 19c26335380bae1b ]---
[  232.525571] RSP: 0018:ffff88018cd27880 EFLAGS: 00010202
[  232.525583] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d
[  232.525592] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb
[  232.525601] RBP: ffff88018cd27a60 R08: ffff8801ba30c600 R09: ffffed00381dfc2a
[  232.525610] R10: ffffed00381dfc2a R11: ffff8801c0efe153 R12: ffff8801c6a0d300
[  232.525618] R13: ffff88018cd278f8 R14: 1ffff100319a4f13 R15: dffffc0000000000
[  232.525636] FS:  00007fef5230a7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000
[  232.530567] RIP: 0010:locks_remove_flock+0x216/0x350
[  232.535742] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  232.535751] CR2: 0000001b32c2c000 CR3: 00000001cdebb000 CR4: 00000000001406e0
[  232.535759] Call Trace:
[  232.535781]  ? flock_lock_inode+0x11c0/0x11c0
[  232.543602] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40
[  232.550334]  ? mark_held_locks+0x130/0x130
[  232.550359]  ? __handle_mm_fault+0xa57/0x5be0
[  232.550376]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  232.550390]  ? locks_remove_posix+0x486/0x850
[  232.550407]  ? vfs_lock_file+0xe0/0xe0
[  232.558140] RSP: 0018:ffff8801bab5f880 EFLAGS: 00010202
[  232.564960]  ? lock_downgrade+0x900/0x900
[  232.564977]  ? kasan_check_read+0x11/0x20
[  232.564989]  ? ep_remove+0x533/0xa30
[  232.565004]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  232.565034]  locks_remove_file+0x148/0x5c0
[  232.572643] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d
[  232.580529]  ? fcntl_setlk+0xfc0/0xfc0
[  232.580546]  ? fsnotify_first_mark+0x350/0x350
[  232.580561]  ? __fsnotify_parent+0xcc/0x420
[  232.580574]  ? perf_trace_sched_process_exec+0x860/0x860
[  232.580603]  ? fsnotify+0xf20/0xf20
[  232.586004] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb
[  232.591585]  ? check_preemption_disabled+0x48/0x280
[  232.591603]  ? __might_sleep+0x95/0x190
[  232.591621]  __fput+0x2f0/0xa70
[  232.591640]  ? get_max_files+0x20/0x20
[  232.591660]  ? trace_hardirqs_on+0xbd/0x310
[  232.600168] RBP: ffff8801bab5fa60 R08: ffff8801ba9c8240 R09: ffffed003b5e5b67
[  232.601520]  ? kasan_check_read+0x11/0x20
[  232.601536]  ? task_work_run+0x1af/0x2a0
[  232.601556]  ? trace_hardirqs_off_caller+0x300/0x300
[  232.606091] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801c938fac0
[  232.624957]  ? filp_close+0x1cd/0x250
[  232.624986]  ____fput+0x15/0x20
[  232.625013]  task_work_run+0x1e8/0x2a0
[  232.625029]  ? task_work_cancel+0x240/0x240
[  232.625045]  ? copy_fd_bitmaps+0x210/0x210
[  232.625067]  exit_to_usermode_loop+0x318/0x380
[  232.630113] R13: ffff8801bab5f8f8 R14: 1ffff1003756bf13 R15: dffffc0000000000
[  232.633819]  ? __bpf_trace_sys_exit+0x30/0x30
[  232.633837]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  232.633860]  do_syscall_64+0x6be/0x820
[  232.639783] FS:  0000000002706940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000
[  232.643964]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[  232.643982]  ? syscall_return_slowpath+0x5e0/0x5e0
[  232.644012]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  232.647964] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  232.653283]  ? trace_hardirqs_on_caller+0x310/0x310
[  232.653299]  ? prepare_exit_to_usermode+0x291/0x3b0
[  232.653317]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  232.653336]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  232.653365] RIP: 0033:0x7fef51a122b0
[  232.659425] CR2: 000000000070a6b4 CR3: 00000001bc3b3000 CR4: 00000000001406f0
[  232.661641] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24
[  232.661650] RSP: 002b:00007ffe14bef9e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  232.661663] RAX: 0000000000000000 RBX: 0000000001ae1250 RCX: 00007fef51a122b0
[  232.661677] RDX: 00007ffe14bf2c40 RSI: 0000000000000002 RDI: 0000000000000007
[  232.665455] Kernel panic - not syncing: Fatal exception
[  232.670949] RBP: 0000000000625500 R08: 00007ffe14bfb0b0 R09: 00007ffe14bfb080
[  232.918874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe14befac0
[  232.926144] R13: 0000000000000001 R14: 00007ffe14befa54 R15: 0000000001ae1250
[  232.933430] Modules linked in:
[  232.937510] Kernel Offset: disabled
[  232.941136] Rebooting in 86400 seconds..