m_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f0001c0]}) [ 2819.246141][T32293] EXT4-fs (sda1): re-mounted. Opts: 04:02:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:51 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x0, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2819.570256][T32265] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:02:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000500)=""/96, 0x60, 0x20, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:02:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2819.649797][T32265] net_ratelimit: 26 callbacks suppressed [ 2819.649804][T32265] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2819.720453][T32321] IPVS: ftp: loaded support on port[0] = 21 [ 2819.799628][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2819.805533][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x221001c0]}) [ 2819.862244][T32329] EXT4-fs (sda1): re-mounted. Opts: [ 2819.879637][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2819.885469][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:51 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2819.959611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2819.965469][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2820.403708][T32290] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:02:52 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x0, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000500)=""/96, 0x60, 0x20, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:02:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a000000]}) [ 2820.551821][T32328] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2820.677630][T32357] IPVS: ftp: loaded support on port[0] = 21 [ 2820.683755][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2820.683822][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2820.911082][T32352] EXT4-fs (sda1): re-mounted. Opts: 04:02:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a1001c0]}) 04:02:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2821.026289][T32339] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2821.365905][T32371] EXT4-fs (sda1): re-mounted. Opts: 04:02:55 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}) 04:02:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:02:55 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x0, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:55 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0x0, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2823.384954][T32395] IPVS: ftp: loaded support on port[0] = 21 [ 2823.415596][T32401] IPVS: ftp: loaded support on port[0] = 21 04:02:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c1001c0]}) 04:02:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:02:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2823.875476][T32408] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2823.995674][T32418] EXT4-fs (sda1): re-mounted. Opts: 04:02:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2824.713138][T32398] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2824.760643][T32398] net_ratelimit: 26 callbacks suppressed [ 2824.760651][T32398] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:02:56 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000000]}) 04:02:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:02:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2824.818248][T32395] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2824.839648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2824.845461][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2825.016450][T32459] IPVS: ftp: loaded support on port[0] = 21 [ 2825.115848][T32458] EXT4-fs (sda1): re-mounted. Opts: [ 2825.559659][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2825.565533][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2825.571427][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2825.577215][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2826.039648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2826.045436][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:58 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x0, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a000000]}) 04:02:58 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0x0, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:02:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:02:58 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2826.403922][T32474] IPVS: ftp: loaded support on port[0] = 21 [ 2826.455706][T32476] IPVS: ftp: loaded support on port[0] = 21 04:02:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 2826.551610][T32483] IPVS: ftp: loaded support on port[0] = 21 [ 2826.553904][T32477] EXT4-fs (sda1): Unrecognized mount option "./file0" or missing value 04:02:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b000000]}) 04:02:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:02:58 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:02:58 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}) [ 2827.098191][T32508] IPVS: ftp: loaded support on port[0] = 21 [ 2827.170552][T32511] EXT4-fs (sda1): re-mounted. Opts: 04:02:59 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x0, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 2827.848077][T32527] IPVS: ftp: loaded support on port[0] = 21 04:02:59 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0x0, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000009f]}) 04:02:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:02:59 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:02:59 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 2828.029076][T32536] IPVS: ftp: loaded support on port[0] = 21 04:03:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2828.144959][T32541] IPVS: ftp: loaded support on port[0] = 21 [ 2828.305151][T32537] EXT4-fs (sda1): re-mounted. Opts: 04:03:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000b0]}) 04:03:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2828.603303][T32538] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:00 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 2829.027532][T32568] EXT4-fs (sda1): re-mounted. Opts: 04:03:01 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x0, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:01 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 2829.543573][T32587] IPVS: ftp: loaded support on port[0] = 21 04:03:01 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x0, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000b7]}) 04:03:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2829.776050][T32599] IPVS: ftp: loaded support on port[0] = 21 [ 2829.938176][T32593] EXT4-fs (sda1): re-mounted. Opts: [ 2830.199649][ C1] net_ratelimit: 27 callbacks suppressed [ 2830.199663][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2830.211240][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2830.279607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2830.285490][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2830.359583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2830.365436][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2830.556722][T32587] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2830.804525][T32599] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2831.079619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2831.085469][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:03 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000100]}) 04:03:03 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:03:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:03 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x0, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:03 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x0, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2831.904539][T32616] IPVS: ftp: loaded support on port[0] = 21 [ 2831.935920][T32618] IPVS: ftp: loaded support on port[0] = 21 04:03:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2832.003974][T32627] IPVS: ftp: loaded support on port[0] = 21 [ 2832.130429][T32631] EXT4-fs (sda1): re-mounted. Opts: 04:03:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000108]}) 04:03:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2832.367994][T32632] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:04 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 2832.554140][T32651] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 04:03:06 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:06 executing program 5: prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:06 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:03:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010000]}) 04:03:06 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x0, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:06 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x0, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2835.038602][T32672] IPVS: ftp: loaded support on port[0] = 21 [ 2835.056959][T32678] IPVS: ftp: loaded support on port[0] = 21 [ 2835.065759][T32671] IPVS: ftp: loaded support on port[0] = 21 04:03:06 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 2835.117442][T32674] EXT4-fs (sda1): re-mounted. Opts: [ 2835.239653][ C1] net_ratelimit: 25 callbacks suppressed [ 2835.239661][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2835.251153][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400101c0]}) 04:03:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:07 executing program 5: prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2835.503196][T32685] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2835.630360][T32685] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2835.664556][T32707] EXT4-fs (sda1): re-mounted. Opts: 04:03:07 executing program 5: prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2835.959592][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2835.965483][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2835.971365][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2835.977135][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2835.993483][T32714] EXT4-fs (sda1): re-mounted. Opts: [ 2836.331756][T32672] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2836.439616][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2836.445431][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:10 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:10 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x410101c0]}) 04:03:10 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x0, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:10 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x0, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2838.478580][T32729] IPVS: ftp: loaded support on port[0] = 21 [ 2838.516819][T32734] IPVS: ftp: loaded support on port[0] = 21 [ 2838.582136][T32740] IPVS: ftp: loaded support on port[0] = 21 04:03:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2838.622726][T32745] EXT4-fs (sda1): re-mounted. Opts: 04:03:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}) 04:03:10 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2838.982842][T32756] EXT4-fs (sda1): re-mounted. Opts: 04:03:10 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b564d00]}) [ 2839.301159][ T308] EXT4-fs (sda1): re-mounted. Opts: 04:03:11 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b564d01]}) 04:03:11 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x0, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:11 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x0, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2840.091405][ T331] EXT4-fs (sda1): re-mounted. Opts: [ 2840.108534][ T334] IPVS: ftp: loaded support on port[0] = 21 04:03:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b564d02]}) [ 2840.218602][ T338] IPVS: ftp: loaded support on port[0] = 21 [ 2840.318076][ T343] IPVS: ftp: loaded support on port[0] = 21 [ 2840.455225][ T353] EXT4-fs (sda1): re-mounted. Opts: 04:03:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b564d03]}) 04:03:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2840.599667][ C1] net_ratelimit: 26 callbacks suppressed [ 2840.599675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2840.611188][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2840.679612][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2840.685432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2840.759635][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2840.765513][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2840.795687][ T369] EXT4-fs (sda1): re-mounted. Opts: [ 2841.363673][ T343] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2841.425983][ T334] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2841.479640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2841.485481][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2841.499136][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:13 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b564d04]}) [ 2841.681847][ T392] IPVS: ftp: loaded support on port[0] = 21 [ 2841.751930][ T397] EXT4-fs (sda1): re-mounted. Opts: 04:03:15 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x0, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:15 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x550001c0]}) 04:03:15 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x0, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2843.897763][ T413] IPVS: ftp: loaded support on port[0] = 21 [ 2843.930333][ T415] IPVS: ftp: loaded support on port[0] = 21 [ 2843.960842][ T421] IPVS: ftp: loaded support on port[0] = 21 04:03:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2844.005382][ T424] EXT4-fs (sda1): re-mounted. Opts: 04:03:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x580001c0]}) [ 2844.271628][ T436] EXT4-fs (sda1): re-mounted. Opts: 04:03:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60050000]}) [ 2844.632937][ T446] EXT4-fs (sda1): re-mounted. Opts: 04:03:17 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2845.401245][ T470] IPVS: ftp: loaded support on port[0] = 21 04:03:17 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x0, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61050000]}) 04:03:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:17 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2845.639667][ C1] net_ratelimit: 27 callbacks suppressed [ 2845.639675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2845.651175][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2845.659075][ T481] IPVS: ftp: loaded support on port[0] = 21 [ 2845.702225][ T488] IPVS: ftp: loaded support on port[0] = 21 04:03:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f00000004c0), 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70050000]}) [ 2846.037718][ T502] EXT4-fs (sda1): re-mounted. Opts: 04:03:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2846.360515][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2846.367220][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2846.375029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2846.382397][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2846.693207][ T470] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:03:18 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2846.837326][ T490] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2846.846959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2846.848435][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2846.919591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2847.014820][ T529] IPVS: ftp: loaded support on port[0] = 21 [ 2847.192538][ T528] EXT4-fs (sda1): re-mounted. Opts: 04:03:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71050000]}) 04:03:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:21 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:21 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x0, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:21 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2849.265019][ T549] IPVS: ftp: loaded support on port[0] = 21 [ 2849.332921][ T552] IPVS: ftp: loaded support on port[0] = 21 [ 2849.380136][ T561] IPVS: ftp: loaded support on port[0] = 21 04:03:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72050000]}) 04:03:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2849.924828][ T560] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74010000]}) 04:03:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75010000]}) [ 2850.568086][ T557] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2850.624487][ T564] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2850.679909][ T564] net_ratelimit: 26 callbacks suppressed [ 2850.679914][ T564] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2850.999635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2851.005515][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2851.089621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2851.095519][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2851.159804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2851.165652][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2851.879629][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2851.885473][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2852.599638][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:03:25 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2853.580542][ T617] IPVS: ftp: loaded support on port[0] = 21 04:03:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76010000]}) 04:03:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x200000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:03:25 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x0, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:25 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x0, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2854.245893][ T631] IPVS: ftp: loaded support on port[0] = 21 [ 2854.295490][ T634] IPVS: ftp: loaded support on port[0] = 21 04:03:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79010000]}) 04:03:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 2854.380971][ T622] EXT4-fs (sda1): re-mounted. Opts: 04:03:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003c000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000080)="f30f4776a0b800008ed0baf80c66b8e0246c8266efbafc0cb09bee0f011c670f01cfd810ba4100b8fbd7ef0f221566b9e20900000f320ff39c8379", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:03:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a010000]}) 04:03:26 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:26 executing program 4: [ 2854.934586][ T660] EXT4-fs (sda1): re-mounted. Opts: 04:03:26 executing program 4: 04:03:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b010000]}) [ 2855.109099][ T671] IPVS: ftp: loaded support on port[0] = 21 [ 2855.516026][ T680] EXT4-fs (sda1): re-mounted. Opts: [ 2855.825846][ T631] net_ratelimit: 22 callbacks suppressed [ 2855.825915][ T631] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2855.907035][ T634] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:03:27 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x0, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2856.040473][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2856.047073][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2856.069970][ T698] IPVS: ftp: loaded support on port[0] = 21 04:03:27 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x0, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:27 executing program 4: 04:03:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f040000]}) 04:03:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2856.078579][ T671] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:03:28 executing program 4: [ 2856.244563][ T710] IPVS: ftp: loaded support on port[0] = 21 [ 2856.399225][ T702] EXT4-fs (sda1): re-mounted. Opts: 04:03:28 executing program 4: 04:03:28 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000c0]}) 04:03:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:28 executing program 4: [ 2856.759802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2856.765812][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2856.772468][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2856.775688][ T729] IPVS: ftp: loaded support on port[0] = 21 [ 2856.779094][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:28 executing program 4: [ 2857.239635][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:03:29 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x0, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2857.631411][ T751] IPVS: ftp: loaded support on port[0] = 21 04:03:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040000]}) 04:03:29 executing program 4: 04:03:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:29 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x0, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:29 executing program 4: [ 2857.913850][ T761] IPVS: ftp: loaded support on port[0] = 21 04:03:29 executing program 4: [ 2858.210612][ T759] EXT4-fs (sda1): re-mounted. Opts: 04:03:30 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:30 executing program 4: 04:03:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80050000]}) 04:03:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:30 executing program 4: [ 2858.502059][ T784] IPVS: ftp: loaded support on port[0] = 21 04:03:31 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810000c0]}) 04:03:31 executing program 4: 04:03:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2859.321009][ T814] IPVS: ftp: loaded support on port[0] = 21 [ 2859.420415][ T806] EXT4-fs (sda1): re-mounted. Opts: 04:03:31 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x0, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:31 executing program 4: 04:03:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820000c0]}) [ 2859.723015][ T826] IPVS: ftp: loaded support on port[0] = 21 04:03:31 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:31 executing program 4: 04:03:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x830000c0]}) 04:03:31 executing program 4: [ 2860.067821][ T841] IPVS: ftp: loaded support on port[0] = 21 04:03:32 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x0, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x840000c0]}) 04:03:32 executing program 4: 04:03:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2860.655168][ T861] IPVS: ftp: loaded support on port[0] = 21 [ 2860.885628][ T858] EXT4-fs (sda1): re-mounted. Opts: [ 2860.919619][ C1] net_ratelimit: 27 callbacks suppressed [ 2860.919628][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2860.930660][ T841] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2860.931219][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2860.952601][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2860.958386][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:32 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x0, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:32 executing program 4: 04:03:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2861.189103][ T877] IPVS: ftp: loaded support on port[0] = 21 [ 2861.334386][ T876] EXT4-fs (sda1): re-mounted. Opts: [ 2861.399666][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2861.405544][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:33 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86010000]}) 04:03:33 executing program 4: [ 2861.489641][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2861.495501][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2861.559641][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:03:33 executing program 4: [ 2861.625548][ T890] IPVS: ftp: loaded support on port[0] = 21 04:03:34 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x0, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2862.450615][ T880] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87010000]}) 04:03:34 executing program 4: 04:03:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2862.607388][ T916] IPVS: ftp: loaded support on port[0] = 21 [ 2862.693337][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2862.701379][ T913] EXT4-fs (sda1): re-mounted. Opts: [ 2863.219160][ T921] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:37 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x0, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:37 executing program 4: 04:03:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2866.075924][ T937] IPVS: ftp: loaded support on port[0] = 21 [ 2866.171106][ T940] EXT4-fs (sda1): re-mounted. Opts: 04:03:38 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x0, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87050000]}) 04:03:38 executing program 4: 04:03:38 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2866.343955][ T948] IPVS: ftp: loaded support on port[0] = 21 04:03:38 executing program 4: [ 2866.439651][ C1] net_ratelimit: 29 callbacks suppressed [ 2866.439660][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2866.451218][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2866.486864][ T954] IPVS: ftp: loaded support on port[0] = 21 04:03:38 executing program 4: socket$inet6(0xa, 0x3, 0x7) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000500)="275a46932f8bb8c160a0753b0a409cb27d14e77e3015c1e8a4949c96023a984f1a6d354d1da9776d6bc590a282230f5c486dad8a1f3934045fcb0bdd2a2063c0fbbec543f1e0f09e952eb6ea225dc7b69a40f22e2bc8b462e0693ea5fe9cfa3b", 0x60, r1}, 0x68) r2 = memfd_create(&(0x7f0000000240)='t\bnu\x00\x00\x18\x00\x00\x00\xe3[\xf8\x00\x00\x82\n\xb6\rw\x03\xb8\xab\xda\x81\xab*\x86\x04\xf5\xa0\xc4\\U\x8d\xf55\xd4g\x11\xf2\x8f\xe6\n', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x210200, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000580)={0x3c72, 0x4, 0x8000, 'queue1\x00', 0x80}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) munlockall() ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, 0x0) sendfile(r1, r1, 0x0, 0x2000005) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @local}, 0x10) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000000c0)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0), 0x10) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000002c0)) setsockopt$inet_mreq(r2, 0x0, 0x0, 0x0, 0x0) [ 2866.604635][ T952] EXT4-fs (sda1): re-mounted. Opts: 04:03:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b000000]}) [ 2866.734320][ T963] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2866.882741][ T963] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2867.041157][ T975] EXT4-fs (sda1): re-mounted. Opts: [ 2867.162564][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2867.170041][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2867.178378][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2867.184552][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2867.274706][ T937] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:03:39 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x0, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:39 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 04:03:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2867.552345][ T1003] IPVS: ftp: loaded support on port[0] = 21 [ 2867.639829][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2867.645638][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:39 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900d0000]}) [ 2867.691582][ T998] EXT4-fs (sda1): re-mounted. Opts: [ 2867.796045][ T1013] IPVS: ftp: loaded support on port[0] = 21 [ 2868.011423][ T1019] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2868.304522][ T1006] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:41 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001700010120000000000000000100b282e7ec50d9ef0000"], 0x1}}, 0x0) 04:03:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91040000]}) 04:03:41 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2869.718924][ T1027] IPVS: ftp: loaded support on port[0] = 21 [ 2869.818457][ T1041] IPVS: ftp: loaded support on port[0] = 21 [ 2869.872905][ T1034] EXT4-fs (sda1): re-mounted. Opts: 04:03:41 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80000000, 0x301800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(r0, 0x0) fchown(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000880)=[{&(0x7f0000000380)="04", 0x1}], 0x1, 0x0) chroot(&(0x7f0000000540)='./file0\x00') syz_genetlink_get_family_id$nbd(0x0) ioctl(0xffffffffffffffff, 0x20000000008912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) quotactl(0x400, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000780)="726a39823c5e585225076631f6177bd7cda5afbd0b8fc8508c0bf3f8fe7f76a8c5e9e24941eacf17841f90b71eeddeb5bcbd90259c6abfb52e4228528595afc88058df71bf5ffcddf74b33b617c7479ae4ef0f6cf6e0886ae1a6afd7bca30704cbf83af2a5a96b4982985fd15b10ba96bdfb2e27287cc0757d210465b917b00b9875a8b9e655786819f15d88c1253aded0688b3e009c95a89858e03e1165d4c7324b8b0bf8974f77739008fb50e0ee34304eb49ee9b02d1162d8a844ec14274a0ad78ef7aa8ceb97224918b67fe0c859aabcb14bc0c4ce2e66e27e0187fa571ab2e1b64292e287df08958f1af86586a9b94ceb4695ef0e252e") ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x7, 0x7f, 0xb6, &(0x7f00000002c0)="99fe115628cada239bb072dee5342ca19cad0610decaf00dd5fb07bde32ca45a32d2af6ebe79fb31e6f5643ff2048ab24d1e765552dd55a00fe42f4b7a3b504590ecef7cd200e2db2a025cfd545cd006ccd7d00222baebbee7b9cad4a70fa8505834283798ede1930b63db4f10027e7f0081bb0d9e72d4dd47451aaf9930c5089f29f949383bb5621f0231bec18841e3b4c8abadb00715c585c1eaae9a3b57a687094a9fc85174ded87a64b6b7dd838a84f7fd695774"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4}}, &(0x7f00000000c0)=0xe8) quotactl(0x7fff, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000004c0)="76a4c3c7c821bb24c10fd30846535293db93d5efdd85565f41524a0aaf62d1e0d05dd64da11552af76b132494d2d00fbaf3e0b5c56eaefb74287f2d23dc23f628dd4b6109b6fbaf6f0d4dc2a77f95816b091a78c6c58631e0cdfba78bb4cf5b3e5d5e4d836c06a581809a9f3b30838b7614ce818855ee066be") sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000017000101000000000000000004060000"], 0x1}}, 0x0) mmap(&(0x7f0000fed000/0x11000)=nil, 0x11000, 0x3000002, 0x1010, 0xffffffffffffffff, 0x0) 04:03:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98010000]}) 04:03:43 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x0, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99010000]}) 04:03:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = socket(0x10, 0x803, 0x0) dup(0xffffffffffffff9c) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7361c86d2000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x20, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xc4}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) getegid() fchown(0xffffffffffffffff, 0x0, 0x0) finit_module(r0, &(0x7f0000000280)='cgroup\x00', 0x2) 04:03:43 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:43 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2871.799695][ C1] net_ratelimit: 26 callbacks suppressed [ 2871.799704][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2871.811228][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2871.879592][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2871.885412][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2871.940220][ T1078] IPVS: ftp: loaded support on port[0] = 21 [ 2871.959644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2871.965442][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2872.054276][ T1076] IPVS: ftp: loaded support on port[0] = 21 [ 2872.061275][ T1089] IPVS: ftp: loaded support on port[0] = 21 04:03:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e000000]}) [ 2872.127069][ T1086] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2872.289762][ T1086] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:03:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f000040]}) 04:03:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2872.679622][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2872.685445][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:44 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}) [ 2873.106244][ T1131] IPVS: ftp: loaded support on port[0] = 21 [ 2873.337946][ T1078] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:03:45 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x0, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:45 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x0, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00d0000]}) [ 2873.703856][ T1150] IPVS: ftp: loaded support on port[0] = 21 [ 2873.757211][ T1152] IPVS: ftp: loaded support on port[0] = 21 04:03:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000040]}) [ 2873.952906][ T1145] EXT4-fs (sda1): re-mounted. Opts: [ 2874.205771][ T1158] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:47 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:47 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7000040]}) 04:03:47 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x0, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2875.906803][ T1185] IPVS: ftp: loaded support on port[0] = 21 [ 2875.911325][ T1186] IPVS: ftp: loaded support on port[0] = 21 [ 2876.003964][ T1194] IPVS: ftp: loaded support on port[0] = 21 04:03:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000080]}) [ 2876.164807][ T1184] EXT4-fs (sda1): re-mounted. Opts: 04:03:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2876.465708][ T1197] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2876.603258][ T1209] EXT4-fs (sda1): re-mounted. Opts: [ 2876.839791][ C1] net_ratelimit: 26 callbacks suppressed [ 2876.839800][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2876.851363][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2877.221618][ T1186] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2877.263626][ T1194] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2877.559654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2877.565496][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2877.571379][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2877.577148][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:49 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x0, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000081]}) 04:03:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:49 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:49 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x0, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2877.790592][ T1227] IPVS: ftp: loaded support on port[0] = 21 [ 2877.829245][ T1231] IPVS: ftp: loaded support on port[0] = 21 [ 2877.866662][ T1235] IPVS: ftp: loaded support on port[0] = 21 04:03:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000082]}) [ 2878.009214][ T1240] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2878.039661][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2878.045487][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000083]}) 04:03:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2879.018717][ T1285] EXT4-fs (sda1): re-mounted. Opts: [ 2879.269048][ T1296] EXT4-fs (sda1): re-mounted. Opts: 04:03:51 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000084]}) 04:03:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:51 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x0, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2879.725980][ T1318] IPVS: ftp: loaded support on port[0] = 21 [ 2879.856921][ T1325] IPVS: ftp: loaded support on port[0] = 21 [ 2879.920523][ T1323] EXT4-fs (sda1): re-mounted. Opts: 04:03:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000100]}) 04:03:53 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:53 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:53 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2881.921794][ T1339] IPVS: ftp: loaded support on port[0] = 21 [ 2881.932078][ T1343] IPVS: ftp: loaded support on port[0] = 21 [ 2881.963170][ T1349] IPVS: ftp: loaded support on port[0] = 21 [ 2882.203094][ C1] net_ratelimit: 27 callbacks suppressed [ 2882.203102][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2882.208852][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2882.259893][ T1345] EXT4-fs (sda1): re-mounted. Opts: 04:03:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000101]}) [ 2882.280537][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2882.287554][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2882.359624][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2882.365450][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000102]}) 04:03:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2883.080390][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2883.086518][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000103]}) [ 2883.297811][ T1343] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2883.351382][ T1352] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2883.415799][ T1402] EXT4-fs (sda1): re-mounted. Opts: [ 2883.439878][ T1352] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:03:55 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010000]}) 04:03:55 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:55 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:03:55 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2883.882945][ T1436] IPVS: ftp: loaded support on port[0] = 21 [ 2883.889561][ T1435] IPVS: ftp: loaded support on port[0] = 21 [ 2883.892606][ T1439] IPVS: ftp: loaded support on port[0] = 21 [ 2883.900940][ T1437] IPVS: ftp: loaded support on port[0] = 21 04:03:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010007]}) 04:03:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:03:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010010]}) 04:03:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2884.971757][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2885.105616][ T1441] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:03:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010015]}) [ 2885.372433][ T1446] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2885.587708][ T1442] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2887.239642][ C1] net_ratelimit: 27 callbacks suppressed [ 2887.239650][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.251178][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2887.959614][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.965442][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2887.971347][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2887.977128][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2888.439641][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2888.445482][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2888.519607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2888.525427][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:04:01 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2889.580638][ T1504] IPVS: ftp: loaded support on port[0] = 21 04:04:01 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:04:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001001b]}) 04:04:01 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x0, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:01 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2890.068769][ T1513] IPVS: ftp: loaded support on port[0] = 21 [ 2890.107056][ T1515] IPVS: ftp: loaded support on port[0] = 21 [ 2890.132932][ T1518] IPVS: ftp: loaded support on port[0] = 21 04:04:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001001f]}) 04:04:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:04:02 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2890.547053][ T1539] IPVS: ftp: loaded support on port[0] = 21 04:04:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2890.718735][ T1526] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010055]}) 04:04:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2891.263247][ T1520] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2891.371193][ T1521] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2891.618158][ T1540] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2892.600392][ C1] net_ratelimit: 25 callbacks suppressed [ 2892.600401][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2892.611897][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2892.679607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2892.685414][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2892.759619][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2892.765539][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2893.479625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2893.485488][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2894.199594][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2894.205419][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010058]}) 04:04:07 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x0, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:04:07 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x0, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2895.899864][ T1601] IPVS: ftp: loaded support on port[0] = 21 [ 2895.945081][ T1607] IPVS: ftp: loaded support on port[0] = 21 04:04:07 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010112]}) 04:04:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2896.158460][ T1617] IPVS: ftp: loaded support on port[0] = 21 04:04:08 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2896.450192][ T1624] EXT4-fs (sda1): re-mounted. Opts: 04:04:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010113]}) 04:04:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2896.623327][ T1639] IPVS: ftp: loaded support on port[0] = 21 04:04:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010117]}) [ 2896.867847][ T1648] EXT4-fs (sda1): re-mounted. Opts: 04:04:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2897.325494][ T1663] EXT4-fs (sda1): re-mounted. Opts: [ 2897.639685][ C1] net_ratelimit: 23 callbacks suppressed [ 2897.639694][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2897.651204][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 04:04:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010140]}) 04:04:09 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x0, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 04:04:09 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2897.840104][ T1679] IPVS: ftp: loaded support on port[0] = 21 [ 2897.848288][ T1639] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2897.877649][ T1682] IPVS: ftp: loaded support on port[0] = 21 04:04:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010141]}) 04:04:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 04:04:10 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) [ 2898.360454][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2898.365201][ T1711] IPVS: ftp: loaded support on port[0] = 21 [ 2898.366953][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2898.379581][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2898.386387][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0010200]}) [ 2898.652086][ T1723] EXT4-fs (sda1): re-mounted. Opts: 04:04:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 04:04:10 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2898.841672][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2898.847900][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001020b]}) [ 2898.919608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2898.990966][ T1743] IPVS: ftp: loaded support on port[0] = 21 04:04:11 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2899.414913][ T1758] IPVS: ftp: loaded support on port[0] = 21 04:04:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0011022]}) 04:04:11 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x0, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:11 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2899.728279][ T1765] IPVS: ftp: loaded support on port[0] = 21 [ 2899.790951][ T1750] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2899.827794][ T1770] IPVS: ftp: loaded support on port[0] = 21 04:04:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001102a]}) 04:04:12 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2900.412250][ T1779] IPVS: ftp: loaded support on port[0] = 21 [ 2900.655388][ T1760] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc001102c]}) [ 2900.898638][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1000000]}) 04:04:13 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2901.363900][ T1795] IPVS: ftp: loaded support on port[0] = 21 04:04:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2000000]}) [ 2902.999657][ C1] net_ratelimit: 29 callbacks suppressed [ 2902.999675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2903.011170][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2903.079630][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2903.085443][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2903.159650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2903.165471][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2903.879638][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2903.885459][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:16 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:16 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:16 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd000000]}) [ 2904.396311][ T1808] IPVS: ftp: loaded support on port[0] = 21 [ 2904.416355][ T1809] IPVS: ftp: loaded support on port[0] = 21 [ 2904.545499][ T1816] IPVS: ftp: loaded support on port[0] = 21 [ 2904.599620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2904.605445][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:16 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x0, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce000000]}) 04:04:16 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2905.070659][ T1824] IPVS: ftp: loaded support on port[0] = 21 [ 2905.152568][ T1828] IPVS: ftp: loaded support on port[0] = 21 04:04:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0040000]}) 04:04:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9010000]}) 04:04:17 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2905.952381][ T1845] IPVS: ftp: loaded support on port[0] = 21 04:04:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb010000]}) 04:04:17 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2906.139371][ T1852] IPVS: ftp: loaded support on port[0] = 21 04:04:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x2710}, 0x10) recvmmsg(r1, &(0x7f00000003c0), 0x7fffffff00000024, 0x0, 0x0) 04:04:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde010000]}) 04:04:18 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0060000]}) [ 2906.733083][ T1867] IPVS: ftp: loaded support on port[0] = 21 04:04:18 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x0, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2906.988791][ T1876] IPVS: ftp: loaded support on port[0] = 21 04:04:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe000000]}) 04:04:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sysfs$3(0x3) 04:04:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f0000000280)="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", 0x566, 0xc002, 0x0, 0x0) read(r1, &(0x7f0000002900)=""/4096, 0x1000) sendto$inet6(r2, &(0x7f0000000040)="f11d9485945530b02c13b63ecca90bcd5e45aae6c27dcfb60d8f3b82d09721908ec5fd0cd4fc40b461afc79758bb2ebb7ba7e67fc49a3d4bb896b2", 0x3b, 0x8000, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000008c0)="14ee697b8127a3a51f838aa6", 0xc, 0x0, 0x0, 0x0) 04:04:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff020000]}) 04:04:19 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0x0, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2907.588547][ T1895] IPVS: ftp: loaded support on port[0] = 21 [ 2907.620490][ T1899] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:04:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0b0000]}) 04:04:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x2270, 0x0) [ 2908.039638][ C1] net_ratelimit: 28 callbacks suppressed [ 2908.039652][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2908.045488][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}) [ 2908.228652][ T1876] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:04:20 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000002080)) creat(0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) getpid() semget(0xffffffffffffffff, 0x3, 0x40) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) set_robust_list(0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc00000000000000000", 0x4a}], 0x1}, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1, 0x0, 0x2800) r3 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9", 0x8}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000000100)) timerfd_gettime(r3, &(0x7f0000000000)) sendfile(r0, r4, 0x0, 0x2000006) 04:04:20 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffda9, 0xfa00, {0xffffffffffffffff, &(0x7f0000000040)}}, 0x20) r0 = socket$inet6(0xa, 0x2000000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e25, 0x0, @mcast2}, 0x38) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "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", 0xff54}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) sendfile(r2, r2, &(0x7f00000000c0), 0x8080ffffff06) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000580)='./file0\x00', 0x4003, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e20, 0xffff, @dev={0xfe, 0x80, [], 0x20}, 0x4}}, [0xffff, 0x1, 0x80, 0x10000, 0x0, 0x80000000, 0x5, 0x0, 0x0, 0x0, 0x4, 0x9, 0x1, 0x47]}, 0x0) r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) socket$inet(0x2, 0x4000000000000001, 0x0) creat(0x0, 0x0) [ 2908.438561][ T1922] IPVS: ftp: loaded support on port[0] = 21 04:04:20 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x0, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:20 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000080)={0x2, 0x4, [0x0]}) 04:04:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000]}) 04:04:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @empty}, {0x307, @remote}, 0x5a, {0x2, 0x0, @local}, 'lapb0\x00'}) [ 2908.696978][ T1941] IPVS: ftp: loaded support on port[0] = 21 [ 2908.759711][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2908.765563][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2908.771512][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2908.777305][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:20 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffda9, 0xfa00, {0xffffffffffffffff, &(0x7f0000000040)}}, 0x20) r0 = socket$inet6(0xa, 0x2000000000000001, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x38) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "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", 0xff54}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) sendfile(r2, r2, &(0x7f00000000c0), 0x8080ffffff06) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x4003, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e20, 0xffff, @dev, 0x4}}, [0xffff, 0x1, 0x80, 0x10000, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x4, 0x9, 0x1, 0x47]}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) creat(0x0, 0x0) [ 2909.129973][ T1895] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2909.239634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2909.245512][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:21 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0x0, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c000000000]}) 04:04:21 executing program 5: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86128) r0 = open(&(0x7f00000002c0)='./bus\x00', 0x1, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="fa1204a49155ce1e00", 0x9}], 0x1, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000180)="010000", 0x3}], 0x1) write(r0, &(0x7f0000000300)="000000deff", 0x5) pwritev(r0, &(0x7f0000002380)=[{&(0x7f0000000500)="692d0825001f3e3c3ee45ea1ad121ec1cc3bc2d92dc2bb78512d43e985942562398f681e1c5a17870108aeada35ab29f925375d09b22368d9774be7bf9c2cea443e6dc3d31b70f1e538ae4f1204ec2145df699869294fb1e7ae28031c203952a4c9a6af5926334eefba653872508a647ab0f0dddfcd0c826cadae61b1fb93ecacea45c343637bd0e24d4b23773fe4cdc86ca65375170ff0eaf4dc1607377bca193280ae44caaf2d870c26ae35bc2adad6269ca0df462e7a69998e0f93ca7a2c327c39ef6d2bfe68a3be3653fa70da5040e91ea8ccda01c79874cf370ed3169656eaed82f02256eb8bda2802802a5bcad0da408e9dddc648034e8c33881f1ce9dbb71cbc80ba8ed2cc466795cab03774d4d485ec28b3d482d536e3b6536ff4377ee8f4905eaf731f75a80f5802f20f05d54101014796902ec3e99a59caafc2f1ff2e1952479c51c4388f5a924ddec3af363ab608b9b5d56b70b0ba0f43ad8c14edcfec2e854ed604186d74217044e961892aa5ab865b2d19a477d3f241a648afb4e6e99d5b7e6e5bf8c4cedf64c46a34a6fb5c20f72817ba0cf7703f185e1cbe671b950efdd5de98da958fe073b8d63d73f596dcc2f7a6fcd43899d5e2d743e308fbd852830afe30daf1b8371494ebe24c2072f43eeee48dddc266d481ceb6584ab8297690599722f6c44541967663a8eae02cba34dd0ea3d569ba356f87d210b16e02a76895e800b94c4080341c08e833a12eecd910c93d86e82cf4df64916d555797c2b4cab65da0c87d4a1de23e4f3ae48ce1a7a1503442a939ba90c5e6001601ce024f78519838e15254deda121e40a0ab4b7f66bfd51a6b088b0261c88a3206cd161aada99959c6aad4e06589a8e899ed7f0aa0f66b26fcac1c7ab2ab1cfa7fbc977127d39d3a3f52be27fcc031c4ec33e34f7ee747c334bc8e7b81beae7314cf3f4c7819fcf2ab369243f48f529dd0a40e384d87b636f2a8ac10ad0b7af71a94e003064696b749611c267d4bcea3f9d9b82f9f8d6aee79536a22a88188dc91e3c667babfc6db18e5de04768c7eb4e10bae8d905a7217c2ea4c7902408cdb6b9e7174e40a95b00c07eff19a62a8374e0ed1fd8710519a475bd45aae483b547d808c08d7797cfbbd3c2765b9b4e246740054acb6824ec2700f7c1d2488952a18678d040e9cdc1e6aabb9e4ec90b6ea66905bd005b064d6b524ea73ebb3edd56d6d2bf5fe397c2b7200d33b39d6ad5ec7f2e5c9ff207ed03d7cfe34e49d0881ed3a4c2e7dc07c032644af0e89b8706e0b70f42e01569776c4892d5dfafecf6fee4e8b7f91331fd72dd70a6d4f30e4d9291d78e511d39aadacba8a3fd0196d128a0f395d0e41a023bb2418e10a1e94a5acc62b4b201feb0e9b3bb2b26f1cf0a58d8725269deb763fbd58b82e8ced288428c2eaee7f74ccce5b57fe3c2134f39a49f009745c292507a7b35e055f4fb472624851692bd0dece59d1fac7458d6b941fa091ecfbc7eb43427e60694690845bc771cf6aed65473f6291cde62c01ff9a7ffa90be33d9791307c195f280cd638556c2ac5a12b26245c8a01b41b6fd4224ed0df8f1c80679b1274558f67cc3f79ef44a363ccf3bb0644876e037dca73bf4f68ab7a0704cd1474d878ae07323d7fd1eced", 0x493}], 0x1, 0x0) [ 2909.620200][ T1961] IPVS: ftp: loaded support on port[0] = 21 04:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) creat(0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) set_robust_list(0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) r3 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) timerfd_gettime(r3, &(0x7f0000000000)) sendfile(r0, r4, 0x0, 0x2000006) 04:04:22 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r0, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000000000]}) 04:04:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) [ 2910.471849][ T1989] IPVS: ftp: loaded support on port[0] = 21 04:04:22 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x0, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100c000000000]}) 04:04:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x800000000e008, 0x1, &(0x7f0000000140)=[{&(0x7f0000000480)="eb3c906d6b66732e666174000204010002060270fff8", 0x16}], 0x0, 0x0) 04:04:22 executing program 4: 04:04:22 executing program 4: [ 2910.703623][ T1998] FAT-fs (loop5): bogus number of directory entries (518) [ 2910.778281][ T1998] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2910.848172][ T2003] IPVS: ftp: loaded support on port[0] = 21 04:04:23 executing program 4: 04:04:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000008040000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x9d, 0x0, &(0x7f0000000240)="ac3c2940a6ab476e218ed4f6a389fd186362440cfaad899738a70bc63666c881824440f8d05b1906e2141b7b9eb952a7f6c54f7180f420c4f5aca3185733ba5c01893029147188426c9c1ddfc6bc22911b74b514edc8139e19730deae83a23582821f815fc61ba6c2a21c2718822da99ece183d6b8c48266fb37af6efca9742bd222e4db9e00083a605fc3d5eb55f72a470fcae61c635eea02b2db3f6a", 0x0, 0x10000}, 0x28) 04:04:23 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0x0, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}) [ 2911.316508][ T2020] IPVS: ftp: loaded support on port[0] = 21 04:04:23 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r0, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:23 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0x8000}) 04:04:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f0000000080)=""/42, 0x2a) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100000000000000fe090000000005000500000000000a00000000000000ff17000000000000"], 0x70}}, 0x0) sendmmsg(r5, &(0x7f0000000180), 0x400000000000117, 0x0) write$selinux_attr(r1, 0x0, 0x0) 04:04:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201c000000000]}) 04:04:23 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x0, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:23 executing program 5: [ 2912.006700][ T2037] IPVS: ftp: loaded support on port[0] = 21 [ 2912.157985][ T2049] IPVS: ftp: loaded support on port[0] = 21 04:04:24 executing program 4: 04:04:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}) 04:04:24 executing program 5: 04:04:24 executing program 5: 04:04:24 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:24 executing program 4: [ 2912.758737][ T2072] IPVS: ftp: loaded support on port[0] = 21 [ 2913.189174][ T2037] net_ratelimit: 28 callbacks suppressed [ 2913.189229][ T2037] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:04:25 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r0, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:25 executing program 5: 04:04:25 executing program 4: 04:04:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000]}) [ 2913.366524][ T2072] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2913.401315][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2913.407626][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2913.437951][ T2049] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2913.479609][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2913.485469][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2913.540844][ T2084] IPVS: ftp: loaded support on port[0] = 21 [ 2913.559660][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2913.565477][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:04:25 executing program 4: 04:04:25 executing program 5: 04:04:25 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x0, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d564b00000000]}) 04:04:25 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:25 executing program 5: 04:04:25 executing program 4: [ 2913.854014][ T2096] IPVS: ftp: loaded support on port[0] = 21 [ 2913.854337][ T2100] IPVS: ftp: loaded support on port[0] = 21 04:04:25 executing program 5: [ 2914.279680][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:04:26 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:26 executing program 4: 04:04:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 04:04:26 executing program 5: 04:04:26 executing program 4: 04:04:26 executing program 5: [ 2914.842390][ T2122] IPVS: ftp: loaded support on port[0] = 21 04:04:26 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x0, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:26 executing program 4: 04:04:26 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 04:04:26 executing program 5: 04:04:27 executing program 5: [ 2915.172212][ T2134] IPVS: ftp: loaded support on port[0] = 21 [ 2915.199159][ T2139] IPVS: ftp: loaded support on port[0] = 21 04:04:27 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:27 executing program 4: 04:04:27 executing program 5: 04:04:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10100c000000000]}) 04:04:27 executing program 4: 04:04:27 executing program 5: [ 2916.103577][ T2157] IPVS: ftp: loaded support on port[0] = 21 04:04:28 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x0, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:28 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x0, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d564b00000000]}) 04:04:28 executing program 5: [ 2916.507301][ T2169] IPVS: ftp: loaded support on port[0] = 21 [ 2916.507434][ T2168] IPVS: ftp: loaded support on port[0] = 21 04:04:28 executing program 4: 04:04:28 executing program 5: [ 2916.930807][ T2159] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2917.335698][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2917.388704][ T2172] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2918.439616][ C1] net_ratelimit: 32 callbacks suppressed [ 2918.439625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2918.451168][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2919.159664][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2919.165571][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2919.171475][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2919.177271][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2919.639659][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2919.645481][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2919.719629][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2919.725448][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:04:31 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 04:04:31 executing program 4: 04:04:31 executing program 5: 04:04:31 executing program 4: 04:04:31 executing program 5: [ 2919.991900][ T2190] IPVS: ftp: loaded support on port[0] = 21 04:04:33 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x0, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:33 executing program 5: 04:04:33 executing program 4: 04:04:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20100c000000000]}) 04:04:33 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:33 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x0, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:33 executing program 4: 04:04:33 executing program 5: [ 2922.063186][ T2205] IPVS: ftp: loaded support on port[0] = 21 [ 2922.072728][ T2209] IPVS: ftp: loaded support on port[0] = 21 [ 2922.114864][ T2214] IPVS: ftp: loaded support on port[0] = 21 04:04:34 executing program 4: 04:04:34 executing program 5: 04:04:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24d564b00000000]}) 04:04:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x75) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 04:04:35 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x0, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:35 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {}, [], {}, [{0x8, 0x4}, {0x8, 0x3}, {0x8, 0x3}, {0x8, 0x6}, {0x8, 0x1}, {}]}, 0x54, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) 04:04:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30100c000000000]}) 04:04:35 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x3, 0x2, 0x7f, 0x0, 0x10001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000002c0)={0x6, 0x8, 0xff, 0x0, 0x5}) 04:04:35 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:35 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x0, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:35 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x6, 0xd8f8, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="1ecd4e5d9974", 0x0, 0x0, 0x10000, 0x3, &(0x7f0000000400)}) 04:04:35 executing program 4: r0 = creat(&(0x7f0000003d00)='./bus\x00', 0x57d) write$P9_RSTATFS(r0, &(0x7f0000003b80)={0x43}, 0x43) [ 2923.483272][ T2257] IPVS: ftp: loaded support on port[0] = 21 [ 2923.556743][ T2259] IPVS: ftp: loaded support on port[0] = 21 [ 2923.572354][ T2264] IPVS: ftp: loaded support on port[0] = 21 04:04:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d564b00000000]}) 04:04:35 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:35 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x0, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2923.757699][ T2276] IPVS: ftp: loaded support on port[0] = 21 [ 2923.799625][ C1] net_ratelimit: 23 callbacks suppressed [ 2923.799633][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2923.811125][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2923.826979][ T2278] IPVS: ftp: loaded support on port[0] = 21 [ 2923.879629][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2923.885465][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2923.959644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2923.965478][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:04:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44d564b00000000]}) [ 2924.307188][ T2284] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2924.470712][ T2284] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2924.679587][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2924.685516][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2924.740929][ T2265] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2924.830102][ T2265] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2924.862623][ T2270] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2925.053651][ T2282] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:36 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x0, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70001c000000000]}) [ 2925.252110][ T2299] IPVS: ftp: loaded support on port[0] = 21 04:04:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801004000000000]}) 04:04:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa01000000000000]}) [ 2928.839653][ C1] net_ratelimit: 26 callbacks suppressed [ 2928.839662][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2928.851203][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:41 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0201c000000000]}) 04:04:41 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:41 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x0, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:41 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x0, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2929.384679][ T2322] IPVS: ftp: loaded support on port[0] = 21 [ 2929.395835][ T2323] IPVS: ftp: loaded support on port[0] = 21 [ 2929.417148][ T2319] IPVS: ftp: loaded support on port[0] = 21 [ 2929.436763][ T2325] IPVS: ftp: loaded support on port[0] = 21 [ 2929.559679][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2929.565509][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2929.571421][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2929.577207][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:41 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}) [ 2930.039625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2930.045510][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2930.119588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2930.125412][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2930.148554][ T2340] IPVS: ftp: loaded support on port[0] = 21 04:04:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100001c000000000]}) 04:04:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}) [ 2930.693420][ T2342] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:42 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x0, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2930.846434][ T2358] IPVS: ftp: loaded support on port[0] = 21 04:04:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}) 04:04:43 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0x0, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:43 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:43 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x0, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2931.278610][ T2369] IPVS: ftp: loaded support on port[0] = 21 [ 2931.323901][ T2367] IPVS: ftp: loaded support on port[0] = 21 [ 2931.358237][ T2372] IPVS: ftp: loaded support on port[0] = 21 04:04:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120101c000000000]}) 04:04:43 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0x0, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x130101c000000000]}) [ 2931.784516][ T2382] IPVS: ftp: loaded support on port[0] = 21 04:04:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150001c000000000]}) 04:04:44 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x0, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1700000000000000]}) [ 2932.595863][ T2400] IPVS: ftp: loaded support on port[0] = 21 04:04:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x170101c000000000]}) 04:04:44 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:44 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x0, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2933.165396][ T2413] IPVS: ftp: loaded support on port[0] = 21 [ 2933.203093][ T2416] IPVS: ftp: loaded support on port[0] = 21 04:04:45 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000]}) [ 2933.384080][ T2423] IPVS: ftp: loaded support on port[0] = 21 04:04:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b0001c000000000]}) 04:04:45 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2933.764650][ T2433] IPVS: ftp: loaded support on port[0] = 21 04:04:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e01000000000000]}) [ 2934.084905][ T2400] net_ratelimit: 29 callbacks suppressed [ 2934.084917][ T2400] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2934.199618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2934.205457][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f0001c000000000]}) [ 2934.279616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2934.285431][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2934.359610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2934.365562][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:04:46 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2934.465763][ T2416] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2934.539920][ T2413] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2934.631606][ T2453] IPVS: ftp: loaded support on port[0] = 21 04:04:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x221001c000000000]}) [ 2934.784452][ T2423] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:04:46 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:46 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x0, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2934.935455][ T2463] IPVS: ftp: loaded support on port[0] = 21 [ 2934.975186][ T2461] IPVS: ftp: loaded support on port[0] = 21 04:04:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a00000000000000]}) 04:04:47 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x0, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2935.400236][ T2474] IPVS: ftp: loaded support on port[0] = 21 [ 2935.533977][ T2467] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:47 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2935.778145][ T2478] IPVS: ftp: loaded support on port[0] = 21 04:04:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a1001c000000000]}) 04:04:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000]}) 04:04:48 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2936.343255][ T2483] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2936.423630][ T2497] IPVS: ftp: loaded support on port[0] = 21 [ 2936.492165][ T2465] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2936.671485][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c1001c000000000]}) 04:04:48 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2937.017123][ T2508] IPVS: ftp: loaded support on port[0] = 21 04:04:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400000000000000]}) 04:04:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a00000000000000]}) [ 2939.249636][ C1] net_ratelimit: 32 callbacks suppressed [ 2939.249645][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2939.261196][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2939.959636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2939.965451][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2939.971327][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2939.977126][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b00000000000000]}) [ 2940.439615][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2940.445429][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2940.519634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2940.525594][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:04:52 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x0, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:52 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001000000000000]}) 04:04:52 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:52 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:52 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x0, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2941.072485][ T2544] IPVS: ftp: loaded support on port[0] = 21 [ 2941.073967][ T2543] IPVS: ftp: loaded support on port[0] = 21 [ 2941.081780][ T2539] IPVS: ftp: loaded support on port[0] = 21 [ 2941.092374][ T2547] IPVS: ftp: loaded support on port[0] = 21 [ 2941.116486][ T2546] IPVS: ftp: loaded support on port[0] = 21 04:04:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400101c000000000]}) 04:04:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x410101c000000000]}) [ 2942.070616][ T2548] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}) [ 2942.114455][ T2550] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2942.264304][ T2549] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2942.313197][ T2551] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2942.375721][ T2552] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x550001c000000000]}) 04:04:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x580001c000000000]}) 04:04:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6005000000000000]}) [ 2944.599631][ C1] net_ratelimit: 25 callbacks suppressed [ 2944.599640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.611142][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2944.679624][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.685431][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2944.759623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.765434][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2945.479612][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2945.485445][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2946.199655][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2946.205497][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:04:59 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x0, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2947.303263][ T2590] IPVS: ftp: loaded support on port[0] = 21 04:04:59 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x0, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6105000000000000]}) 04:04:59 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:59 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:04:59 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2947.714824][ T2598] IPVS: ftp: loaded support on port[0] = 21 [ 2947.739241][ T2595] IPVS: ftp: loaded support on port[0] = 21 [ 2947.771623][ T2601] IPVS: ftp: loaded support on port[0] = 21 [ 2947.875379][ T2606] IPVS: ftp: loaded support on port[0] = 21 04:04:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7005000000000000]}) 04:04:59 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x0, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7105000000000000]}) [ 2948.207790][ T2615] IPVS: ftp: loaded support on port[0] = 21 04:05:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7205000000000000]}) 04:05:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7401000000000000]}) 04:05:01 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7501000000000000]}) [ 2949.364112][ T2639] IPVS: ftp: loaded support on port[0] = 21 04:05:01 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x0, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2949.649624][ C1] net_ratelimit: 26 callbacks suppressed [ 2949.649632][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2949.661169][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:01 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:01 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7601000000000000]}) [ 2949.741711][ T2652] IPVS: ftp: loaded support on port[0] = 21 [ 2949.775369][ T2654] IPVS: ftp: loaded support on port[0] = 21 04:05:01 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x0, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2949.802850][ T2661] IPVS: ftp: loaded support on port[0] = 21 [ 2949.935622][ T2668] IPVS: ftp: loaded support on port[0] = 21 04:05:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7901000000000000]}) [ 2950.360462][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.367018][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2950.373756][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.380177][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2950.407662][ T2663] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2950.554822][ T2663] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2950.798846][ T2639] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2950.839649][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.845502][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2950.884859][ T2669] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:02 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2950.976023][ T2664] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2951.006487][ T2679] IPVS: ftp: loaded support on port[0] = 21 04:05:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a01000000000000]}) [ 2951.027114][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b01000000000000]}) 04:05:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f04000000000000]}) 04:05:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000c000000000]}) 04:05:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004000000000000]}) [ 2954.999638][ C1] net_ratelimit: 26 callbacks suppressed [ 2954.999647][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2955.011154][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2955.079632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2955.085448][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2955.159640][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2955.165457][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:05:07 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x0, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:07 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8005000000000000]}) 04:05:07 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:07 executing program 5: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:07 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x0, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2955.574496][ T2715] IPVS: ftp: loaded support on port[0] = 21 [ 2955.595175][ T2720] IPVS: ftp: loaded support on port[0] = 21 [ 2955.607944][ T2719] IPVS: ftp: loaded support on port[0] = 21 [ 2955.608124][ T2722] IPVS: ftp: loaded support on port[0] = 21 [ 2955.733672][ T2725] IPVS: ftp: loaded support on port[0] = 21 04:05:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810000c000000000]}) [ 2955.879584][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2955.885408][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820000c000000000]}) 04:05:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x830000c000000000]}) [ 2956.599620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2956.605467][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x840000c000000000]}) 04:05:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8601000000000000]}) 04:05:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[@ANYBLOB]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:09 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:09 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:09 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x0, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2957.338435][ T2766] IPVS: ftp: loaded support on port[0] = 21 [ 2957.398707][ T2770] IPVS: ftp: loaded support on port[0] = 21 [ 2957.427913][ T2772] IPVS: ftp: loaded support on port[0] = 21 04:05:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2957.511265][ T2775] EXT4-fs (sda1): re-mounted. Opts: 04:05:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8701000000000000]}) 04:05:09 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2957.804454][ T2788] EXT4-fs (sda1): re-mounted. Opts: 04:05:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2957.856785][ T2796] IPVS: ftp: loaded support on port[0] = 21 04:05:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8705000000000000]}) 04:05:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b00000000000000]}) 04:05:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900d000000000000]}) 04:05:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2959.033428][ T2829] EXT4-fs (sda1): re-mounted. Opts: 04:05:11 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:11 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9104000000000000]}) 04:05:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:11 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x0, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2959.382229][ T2847] IPVS: ftp: loaded support on port[0] = 21 [ 2959.391406][ T2848] IPVS: ftp: loaded support on port[0] = 21 [ 2959.455738][ T2857] IPVS: ftp: loaded support on port[0] = 21 04:05:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="08dc1f123c123f3188b070") r1 = gettid() capget(&(0x7f0000000000)={0x20080522, r1}, &(0x7f00000001c0)) 04:05:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9801000000000000]}) 04:05:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2960.011999][ T2858] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2960.049625][ C1] net_ratelimit: 29 callbacks suppressed [ 2960.049634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2960.061205][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2960.253761][ T2858] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:05:12 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x1) 04:05:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2960.514792][ T2855] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @multicast2}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendto$inet(r0, 0x0, 0x26a, 0x200007fc, &(0x7f00000000c0)={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) sendto$inet(r0, &(0x7f0000000280)="d5", 0x1, 0x40081, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2960.560305][ T2855] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2960.759619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2960.765482][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2960.771392][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2960.777191][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2960.797783][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2960.800692][ T2903] EXT4-fs (sda1): re-mounted. Opts: [ 2960.873009][ T2862] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2961.249830][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:05:16 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9901000000000000]}) 04:05:16 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000400)={0x2}, 0x8) 04:05:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:16 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x0, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:16 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2964.375409][ T2919] IPVS: ftp: loaded support on port[0] = 21 [ 2964.391822][ T2916] IPVS: ftp: loaded support on port[0] = 21 [ 2964.426395][ T2924] IPVS: ftp: loaded support on port[0] = 21 04:05:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) setrlimit(0x7, &(0x7f0000becff0)) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) 04:05:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e00000000000000]}) [ 2964.766954][ T2917] EXT4-fs (sda1): re-mounted. Opts: 04:05:16 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000080)=0x3) 04:05:16 executing program 4: r0 = epoll_create(0x7) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) close(r1) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 04:05:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f00004000000000]}) 04:05:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2965.346601][ T2961] EXT4-fs (sda1): re-mounted. Opts: [ 2965.399641][ C1] net_ratelimit: 23 callbacks suppressed [ 2965.399656][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2965.411191][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2965.479605][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2965.485492][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2965.559746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2965.565631][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2965.721481][ T2919] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2965.848507][ T2924] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2965.932989][ T2916] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 04:05:17 executing program 4: 04:05:17 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x0, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa001000000000000]}) 04:05:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:17 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x0, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2966.082827][ T2980] IPVS: ftp: loaded support on port[0] = 21 [ 2966.192649][ T2987] IPVS: ftp: loaded support on port[0] = 21 04:05:18 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, 0x0) fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2966.279631][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:05:18 executing program 4: 04:05:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00d000000000000]}) 04:05:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:18 executing program 4: [ 2966.490171][ T3001] IPVS: ftp: loaded support on port[0] = 21 04:05:18 executing program 4: 04:05:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000004000000000]}) 04:05:18 executing program 4: [ 2966.818144][ T3003] EXT4-fs (sda1): re-mounted. Opts: 04:05:19 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x0, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:19 executing program 4: 04:05:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb700004000000000]}) [ 2967.761267][ T3035] IPVS: ftp: loaded support on port[0] = 21 04:05:19 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x0, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:19 executing program 4: 04:05:19 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, 0x0) fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100000000000000]}) [ 2967.941142][ T3033] EXT4-fs (sda1): re-mounted. Opts: 04:05:19 executing program 4: [ 2967.997946][ T3047] IPVS: ftp: loaded support on port[0] = 21 [ 2968.054544][ T3051] IPVS: ftp: loaded support on port[0] = 21 04:05:20 executing program 4: 04:05:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc200000000000000]}) [ 2968.544396][ T3069] EXT4-fs (sda1): re-mounted. Opts: [ 2968.699460][ T3062] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:21 executing program 4: 04:05:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd00000000000000]}) 04:05:21 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x0, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2969.449160][ T3096] IPVS: ftp: loaded support on port[0] = 21 04:05:21 executing program 4: [ 2969.587178][ T3094] EXT4-fs (sda1): re-mounted. Opts: [ 2970.439602][ C1] net_ratelimit: 30 callbacks suppressed [ 2970.439610][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2970.451072][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2971.159610][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2971.165400][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2971.171262][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2971.177012][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:23 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, 0x0) fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:23 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x0, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce00000000000000]}) 04:05:23 executing program 4: 04:05:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:23 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:23 executing program 4: [ 2971.591128][ T3125] IPVS: ftp: loaded support on port[0] = 21 [ 2971.598559][ T3124] IPVS: ftp: loaded support on port[0] = 21 [ 2971.639640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2971.645453][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2971.655991][ T3135] IPVS: ftp: loaded support on port[0] = 21 [ 2971.719636][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2971.725507][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:05:23 executing program 4: [ 2971.814912][ T3123] EXT4-fs (sda1): re-mounted. Opts: 04:05:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd004000000000000]}) 04:05:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:23 executing program 4: 04:05:24 executing program 4: [ 2972.184842][ T3170] EXT4-fs (sda1): re-mounted. Opts: 04:05:24 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:24 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd901000000000000]}) 04:05:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:24 executing program 4: [ 2972.946077][ T3196] IPVS: ftp: loaded support on port[0] = 21 [ 2972.952739][ T3187] IPVS: ftp: loaded support on port[0] = 21 04:05:25 executing program 4: 04:05:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb01000000000000]}) [ 2973.167282][ T3190] EXT4-fs (sda1): re-mounted. Opts: 04:05:25 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="08dc1f123c123f3188b070") capget(&(0x7f0000000000)={0x20080522}, &(0x7f00000001c0)) [ 2973.380684][ T3225] IPVS: ftp: loaded support on port[0] = 21 04:05:25 executing program 4: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 04:05:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2973.945758][ T3244] EXT4-fs (sda1): re-mounted. Opts: [ 2974.086532][ T3200] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2974.171198][ T3197] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2974.269322][ T3230] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2975.799626][ C1] net_ratelimit: 26 callbacks suppressed [ 2975.799635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2975.811136][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2975.879615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2975.885466][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2975.959632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2975.965484][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2976.679594][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2976.685400][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:29 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x172) 04:05:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde01000000000000]}) 04:05:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2977.385703][ T3271] IPVS: ftp: loaded support on port[0] = 21 [ 2977.399681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2977.405479][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2977.522581][ T3276] EXT4-fs (sda1): re-mounted. Opts: 04:05:29 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:29 executing program 4: socket$inet6(0xa, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) 04:05:29 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe006000000000000]}) 04:05:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2977.923207][ T3288] IPVS: ftp: loaded support on port[0] = 21 [ 2977.974730][ T3306] IPVS: ftp: loaded support on port[0] = 21 [ 2978.057076][ T3307] EXT4-fs (sda1): re-mounted. Opts: 04:05:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe00000000000000]}) 04:05:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00') pread64(r1, &(0x7f00000000c0)=""/8, 0xfd78, 0x80100800) [ 2978.442622][ T3329] EXT4-fs (sda1): re-mounted. Opts: [ 2978.541060][ T3313] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:30 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff02000000000000]}) 04:05:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00') pread64(r1, &(0x7f00000000c0)=""/8, 0xfd78, 0x80100800) [ 2979.033252][ T3351] IPVS: ftp: loaded support on port[0] = 21 [ 2979.103774][ T3349] EXT4-fs (sda1): re-mounted. Opts: 04:05:31 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0b000000000000]}) [ 2979.252687][ T3360] IPVS: ftp: loaded support on port[0] = 21 04:05:31 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x0, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:31 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2979.413010][ T3367] IPVS: ftp: loaded support on port[0] = 21 [ 2979.475170][ T3373] IPVS: ftp: loaded support on port[0] = 21 04:05:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 2979.575476][ T3370] EXT4-fs (sda1): re-mounted. Opts: 04:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2979.926167][ T3388] EXT4-fs (sda1): re-mounted. Opts: 04:05:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2980.061936][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2980.239354][ T3396] EXT4-fs (sda1): re-mounted. Opts: 04:05:32 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, 0x0, &(0x7f00000002c0)='\x00', 0x1, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) [ 2980.538872][ T3378] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2980.663219][ T3411] IPVS: ftp: loaded support on port[0] = 21 [ 2980.738138][ T3415] EXT4-fs (sda1): re-mounted. Opts: 04:05:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2980.839649][ C1] net_ratelimit: 27 callbacks suppressed [ 2980.839667][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2980.851153][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2981.265985][ T3429] EXT4-fs (sda1): re-mounted. Opts: [ 2981.559681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2981.565549][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2981.571437][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2981.577206][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2981.663085][ T3416] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2981.719701][ T3416] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2982.039644][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2982.045615][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2982.119617][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:05:35 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x0, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2983.674774][ T3446] IPVS: ftp: loaded support on port[0] = 21 04:05:36 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x0, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 04:05:36 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:36 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, 0x0, &(0x7f00000002c0)='\x00', 0x1, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2984.322442][ T3457] IPVS: ftp: loaded support on port[0] = 21 [ 2984.322734][ T3454] IPVS: ftp: loaded support on port[0] = 21 [ 2984.330039][ T3451] IPVS: ftp: loaded support on port[0] = 21 [ 2984.439629][ T3464] EXT4-fs (sda1): re-mounted. Opts: 04:05:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 04:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2984.815588][ T3478] EXT4-fs (sda1): re-mounted. Opts: 04:05:36 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x0, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2984.898740][ T3465] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2985.012425][ T3483] IPVS: ftp: loaded support on port[0] = 21 04:05:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2985.263876][ T3488] EXT4-fs (sda1): re-mounted. Opts: 04:05:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2985.573224][ T3504] EXT4-fs (sda1): re-mounted. Opts: 04:05:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17]}) [ 2985.733453][ T3458] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2985.866282][ T3466] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2985.919677][ T3466] net_ratelimit: 24 callbacks suppressed [ 2985.919685][ T3466] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2986.199643][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2986.205523][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2986.279715][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2986.285550][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2986.334129][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2986.360445][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2986.366299][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2986.410196][ T3485] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2987.079802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2987.085655][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:40 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x0, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b]}) 04:05:40 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x0, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2988.828410][ T3526] IPVS: ftp: loaded support on port[0] = 21 [ 2988.897285][ T3528] IPVS: ftp: loaded support on port[0] = 21 04:05:40 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, 0x0, &(0x7f00000002c0)='\x00', 0x1, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:40 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a]}) 04:05:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2989.116050][ T3537] IPVS: ftp: loaded support on port[0] = 21 [ 2989.174041][ T3543] IPVS: ftp: loaded support on port[0] = 21 04:05:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}) [ 2989.602760][ T3562] EXT4-fs (sda1): re-mounted. Opts: 04:05:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34]}) [ 2989.960342][ T3573] EXT4-fs (sda1): re-mounted. Opts: 04:05:42 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x0, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:42 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}) [ 2990.585276][ T3597] IPVS: ftp: loaded support on port[0] = 21 [ 2990.586181][ T3595] EXT4-fs (sda1): re-mounted. Opts: [ 2990.924723][ T3600] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:42 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x0, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:42 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:42 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b]}) 04:05:42 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2991.070090][ T3600] net_ratelimit: 26 callbacks suppressed [ 2991.070141][ T3600] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2991.100712][ T3613] IPVS: ftp: loaded support on port[0] = 21 [ 2991.121688][ T3612] IPVS: ftp: loaded support on port[0] = 21 [ 2991.162985][ T3621] IPVS: ftp: loaded support on port[0] = 21 [ 2991.212832][ T3622] EXT4-fs (sda1): re-mounted. Opts: [ 2991.239584][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2991.245408][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:43 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}) [ 2991.576898][ T3633] EXT4-fs (sda1): re-mounted. Opts: 04:05:43 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b]}) [ 2991.872792][ T3645] EXT4-fs (sda1): re-mounted. Opts: [ 2991.959969][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2991.965786][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2991.971678][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2991.977483][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2992.245284][ T3612] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 2992.449615][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2992.455490][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e]}) 04:05:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:45 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x0, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:45 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:45 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2994.134567][ T3670] IPVS: ftp: loaded support on port[0] = 21 [ 2994.145551][ T3666] IPVS: ftp: loaded support on port[0] = 21 [ 2994.219420][ T3681] IPVS: ftp: loaded support on port[0] = 21 [ 2994.281294][ T3688] EXT4-fs (sda1): re-mounted. Opts: 04:05:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1]}) 04:05:46 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2994.505133][ T3701] IPVS: ftp: loaded support on port[0] = 21 [ 2994.546487][ T3705] EXT4-fs (sda1): re-mounted. Opts: 04:05:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2]}) [ 2994.960878][ T3721] EXT4-fs (sda1): re-mounted. Opts: 04:05:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd]}) 04:05:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2995.275163][ T3733] EXT4-fs (sda1): re-mounted. Opts: 04:05:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2995.616456][ T3748] EXT4-fs (sda1): re-mounted. Opts: 04:05:47 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2995.868842][ T3759] IPVS: ftp: loaded support on port[0] = 21 [ 2995.906713][ T3755] EXT4-fs (sda1): re-mounted. Opts: 04:05:47 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce]}) 04:05:47 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 2996.012530][ T3766] IPVS: ftp: loaded support on port[0] = 21 [ 2996.073991][ T3769] IPVS: ftp: loaded support on port[0] = 21 [ 2996.119595][ C1] net_ratelimit: 24 callbacks suppressed [ 2996.119603][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2996.131120][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2996.136950][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2996.142766][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:48 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe]}) [ 2996.475374][ T3787] IPVS: ftp: loaded support on port[0] = 21 [ 2996.494571][ T3788] EXT4-fs (sda1): re-mounted. Opts: 04:05:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2996.599599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2996.605422][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2996.679630][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2996.685439][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:05:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10a]}) [ 2996.759598][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2996.765464][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2996.917603][ T3801] EXT4-fs (sda1): re-mounted. Opts: 04:05:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2997.155132][ T3761] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 2997.313827][ T3772] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2997.442344][ T3817] EXT4-fs (sda1): re-mounted. Opts: [ 2997.450668][ T3771] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2997.675831][ T3790] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3001.639596][ C1] net_ratelimit: 28 callbacks suppressed [ 3001.639605][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.651091][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:53 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e]}) 04:05:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:54 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 3002.185040][ T3836] IPVS: ftp: loaded support on port[0] = 21 [ 3002.308815][ T3843] IPVS: ftp: loaded support on port[0] = 21 [ 3002.356618][ T3844] EXT4-fs (sda1): re-mounted. Opts: [ 3002.369591][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3002.375413][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3002.381298][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3002.387081][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:05:54 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:54 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}) 04:05:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3002.563012][ T3850] IPVS: ftp: loaded support on port[0] = 21 [ 3002.640138][ T3860] IPVS: ftp: loaded support on port[0] = 21 04:05:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x174]}) 04:05:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3002.839587][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3002.845445][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3002.919595][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3002.925420][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3003.157046][ T3877] EXT4-fs (sda1): re-mounted. Opts: 04:05:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x175]}) [ 3003.433088][ T3837] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3003.506457][ T3892] EXT4-fs (sda1): re-mounted. Opts: 04:05:55 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3003.701841][ T3863] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3003.805243][ T3905] IPVS: ftp: loaded support on port[0] = 21 04:05:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x176]}) 04:05:55 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 3003.957971][ T3902] EXT4-fs (sda1): re-mounted. Opts: [ 3004.136056][ T3919] IPVS: ftp: loaded support on port[0] = 21 04:05:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x179]}) 04:05:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:58 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:58 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:05:58 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 3006.509351][ T3933] IPVS: ftp: loaded support on port[0] = 21 [ 3006.525425][ T3937] IPVS: ftp: loaded support on port[0] = 21 [ 3006.627790][ T3940] IPVS: ftp: loaded support on port[0] = 21 04:05:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a]}) [ 3006.703993][ T3947] EXT4-fs (sda1): re-mounted. Opts: 04:05:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100032, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:58 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 3006.960085][ T3964] IPVS: ftp: loaded support on port[0] = 21 [ 3006.999609][ C1] net_ratelimit: 26 callbacks suppressed [ 3006.999617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.011126][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.079634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.085428][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.159590][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.165404][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.180679][ T3962] EXT4-fs (sda1): re-mounted. Opts: 04:05:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17b]}) 04:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:05:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x186]}) [ 3007.757040][ T3948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3007.815598][ T3948] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 3007.880693][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.887115][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.926255][ T3945] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3007.933743][ T3979] EXT4-fs (sda1): re-mounted. Opts: [ 3007.981013][ T3945] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 3008.024599][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3008.203023][ T3965] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:06:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x187]}) [ 3008.422700][ T3997] EXT4-fs (sda1): re-mounted. Opts: 04:06:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3008.717679][ T4009] EXT4-fs (sda1): re-mounted. Opts: [ 3012.039602][ C1] net_ratelimit: 24 callbacks suppressed [ 3012.039611][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3012.051122][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:06:04 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:04 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x198]}) 04:06:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:06:04 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='user.syz\x00') socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:04 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 3012.759620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3012.765449][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3012.771349][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3012.777126][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3012.790016][ T4021] IPVS: ftp: loaded support on port[0] = 21 [ 3012.797942][ T4026] IPVS: ftp: loaded support on port[0] = 21 [ 3012.809207][ T4029] IPVS: ftp: loaded support on port[0] = 21 [ 3012.865284][ T4033] IPVS: ftp: loaded support on port[0] = 21 04:06:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x199]}) [ 3013.003195][ T4031] EXT4-fs (sda1): re-mounted. Opts: 04:06:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3013.239817][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3013.245869][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3013.319687][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3013.325594][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3013.434387][ T4054] EXT4-fs (sda1): re-mounted. Opts: 04:06:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3013.586579][ T4043] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3013.795244][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3013.845846][ T4064] EXT4-fs (sda1): re-mounted. Opts: 04:06:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:06:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}) [ 3014.025997][ T4028] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3014.243605][ T4072] EXT4-fs (sda1): re-mounted. Opts: 04:06:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0]}) [ 3017.399606][ C1] net_ratelimit: 23 callbacks suppressed [ 3017.399615][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3017.411111][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:06:09 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:06:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d9]}) 04:06:09 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:09 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 3017.479620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3017.485435][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3017.518857][ T4102] IPVS: ftp: loaded support on port[0] = 21 [ 3017.533280][ T4100] IPVS: ftp: loaded support on port[0] = 21 [ 3017.547369][ T4105] IPVS: ftp: loaded support on port[0] = 21 [ 3017.559615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3017.565431][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:09 executing program 4: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1db]}) [ 3017.719271][ T4098] EXT4-fs (sda1): re-mounted. Opts: [ 3017.788106][ T4119] IPVS: ftp: loaded support on port[0] = 21 04:06:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000ac0)=@known='trusted.overlay.impure\x00') getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:06:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1de]}) [ 3018.137409][ T4128] EXT4-fs (sda1): re-mounted. Opts: 04:06:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3018.279597][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3018.285475][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3018.534927][ T4141] EXT4-fs (sda1): re-mounted. Opts: 04:06:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ff]}) 04:06:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3018.860644][ T4100] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 3018.999633][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3019.057195][ T4155] EXT4-fs (sda1): re-mounted. Opts: 04:06:11 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x0, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:11 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) bind$inet6(r0, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, &(0x7f0000000b00)=@abs, 0x6e) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0x0, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r2, 0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 04:06:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47f]}) 04:06:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) 04:06:11 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$9p(0xffffffffffffffff, &(0x7f0000000300), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={0xffffffffffffffff, 0x0, 0x0}, 0x18) socket$pptp(0x18, 0x1, 0x2) openat$pfkey(0xffffffffffffff9c, 0x0, 0x80, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x8, 0x8d0, 0x0, 0xffffffffffffff04, 0x6041b, 0x1, 0xe5, 0x20, 0xffff, 0x10001, 0x9, 0x1000, 0x7, 0x1000, 0x2147, 0x9, 0x10000, 0x0, 0x9, 0x8, 0x197b1d1b, 0x0, 0x9, 0x48, 0x3, 0x8, 0x6373, 0x9, 0x80, 0x9, 0x0, 0x9, 0x80000001, 0x7fffffff, 0x0, 0xaa4e, 0x0, @perf_config_ext={0x117e8340}, 0x1114, 0x3, 0x6, 0x9, 0x2, 0x13, 0x101}, 0x0, 0x3, r1, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) [ 3019.391890][ T4173] IPVS: ftp: loaded support on port[0] = 21 [ 3019.451033][ T4179] IPVS: ftp: loaded support on port[0] = 21 [ 3019.465304][ T4182] IPVS: ftp: loaded support on port[0] = 21 [ 3019.630028][ T4177] EXT4-fs (sda1): re-mounted. Opts: 04:06:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 04:06:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x7a000000, [0x40000002], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480]}) 04:06:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3020.052232][ T4202] kasan: CONFIG_KASAN_INLINE enabled [ 3020.058918][ T4202] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 3020.103402][ T4202] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 3020.110369][ T4202] CPU: 0 PID: 4202 Comm: syz-executor4 Not tainted 5.0.0-rc4-next-20190130 #22 [ 3020.114061][ T4179] kobject: 'tx-0' (0000000094065e71): kobject_uevent_env [ 3020.119287][ T4202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3020.119342][ T4202] RIP: 0010:relay_open_buf.part.0+0x7cb/0xb40 [ 3020.119372][ T4202] Code: c1 ea 03 80 3c 02 00 0f 85 4c 03 00 00 49 8d 7d 58 4d 89 ac 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 1b 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 3020.162075][ T4202] RSP: 0018:ffff88805020f670 EFLAGS: 00010203 [ 3020.168145][ T4202] RAX: dffffc0000000000 RBX: ffff8880539bf5c0 RCX: ffffc9000e878000 [ 3020.176117][ T4202] RDX: 0000000000000008 RSI: ffffffff81833b80 RDI: 0000000000000047 [ 3020.184085][ T4202] RBP: ffff88805020f6e8 R08: 0000000000000006 R09: ffff888055e2ce08 [ 3020.192060][ T4202] R10: ffff888055e2c540 R11: 0000000000000000 R12: ffff88808ab115c0 [ 3020.200037][ T4202] R13: ffffffffffffffef R14: 0000000000000000 R15: 00000000000003a8 [ 3020.208012][ T4202] FS: 00007f712f5ab700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 3020.216943][ T4202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3020.217375][ T4179] kobject: 'tx-0' (0000000094065e71): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 3020.223521][ T4202] CR2: 00007f6f43e39518 CR3: 0000000094f8a000 CR4: 00000000001426f0 [ 3020.223533][ T4202] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3020.223541][ T4202] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3020.223555][ T4202] Call Trace: [ 3020.223596][ T4202] ? kmem_cache_alloc_trace+0x354/0x760 [ 3020.223618][ T4202] relay_open+0x5f3/0xaf0 [ 3020.271711][ T4202] ? relay_open_buf.part.0+0xb40/0xb40 [ 3020.277239][ T4202] ? __debugfs_create_file+0x301/0x400 [ 3020.282705][ T4202] ? debugfs_create_file+0x5a/0x70 [ 3020.287822][ T4202] do_blk_trace_setup+0x50d/0xdb0 [ 3020.292855][ T4202] ? blk_tracer_print_line+0x60/0x60 [ 3020.298146][ T4202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3020.304410][ T4202] ? _copy_from_user+0xdd/0x150 [ 3020.306294][ T4179] kobject: 'batman_adv' (00000000fc5915ec): kobject_add_internal: parent: 'erspan0', set: '' [ 3020.309266][ T4202] __blk_trace_setup+0xe3/0x190 [ 3020.309283][ T4202] ? do_blk_trace_setup+0xdb0/0xdb0 [ 3020.309359][ T4202] ? disk_name+0xae/0x110 [ 3020.334300][ T4202] blk_trace_ioctl+0x170/0x300 [ 3020.339067][ T4202] ? blk_add_trace_rq_remap+0x6b0/0x6b0 [ 3020.339183][ T4173] kobject: 'ip_vti0' (0000000020764cd6): kobject_add_internal: parent: 'net', set: 'devices' [ 3020.344623][ T4202] ? __fget+0x473/0x710 [ 3020.344663][ T4202] blkdev_ioctl+0x141/0x2120 [ 3020.344680][ T4202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3020.344693][ T4202] ? blkpg_ioctl+0xc10/0xc10 [ 3020.344716][ T4202] ? lock_downgrade+0xc40/0xc40 [ 3020.344738][ T4202] ? kasan_check_read+0x11/0x20 [ 3020.374654][ T4173] kobject: 'ip_vti0' (0000000020764cd6): kobject_uevent_env [ 3020.375098][ T4202] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 3020.375119][ T4202] ? rcu_read_unlock_special+0x380/0x380 04:06:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) lremovexattr(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2020) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000240), 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100020, 0x0) [ 3020.380440][ T4173] kobject: 'ip_vti0' (0000000020764cd6): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 3020.384810][ T4202] ? __fget+0x49a/0x710 [ 3020.384899][ T4202] block_ioctl+0xee/0x130 [ 3020.384923][ T4202] ? blkdev_fallocate+0x410/0x410 [ 3020.395398][ T4173] kobject: 'queues' (00000000928231c3): kobject_add_internal: parent: 'ip_vti0', set: '' [ 3020.398163][ T4202] do_vfs_ioctl+0x107b/0x17d0 [ 3020.398183][ T4202] ? ioctl_preallocate+0x2f0/0x2f0 [ 3020.398203][ T4202] ? __fget_light+0x2db/0x420 [ 3020.404270][ T4173] kobject: 'queues' (00000000928231c3): kobject_uevent_env [ 3020.414125][ T4202] ? fget_raw+0x20/0x20 [ 3020.414207][ T4202] ? put_timespec64+0x115/0x1b0 [ 3020.414222][ T4202] ? nsecs_to_jiffies+0x30/0x30 [ 3020.414250][ T4202] ? do_syscall_64+0x8c/0x800 [ 3020.424593][ T4173] kobject: 'queues' (00000000928231c3): kobject_uevent_env: filter function caused the event to drop! [ 3020.427703][ T4202] ? do_syscall_64+0x8c/0x800 [ 3020.427719][ T4202] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3020.427750][ T4202] ? security_file_ioctl+0x93/0xc0 [ 3020.443359][ T4173] kobject: 'rx-0' (00000000fa59552a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3020.447802][ T4202] ksys_ioctl+0xab/0xd0 [ 3020.447820][ T4202] __x64_sys_ioctl+0x73/0xb0 [ 3020.447842][ T4202] do_syscall_64+0x1a3/0x800 [ 3020.453435][ T4173] kobject: 'rx-0' (00000000fa59552a): kobject_uevent_env [ 3020.459680][ T4202] ? syscall_return_slowpath+0x5f0/0x5f0 [ 3020.459697][ T4202] ? prepare_exit_to_usermode+0x232/0x3b0 [ 3020.459716][ T4202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3020.459765][ T4202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3020.459783][ T4202] RIP: 0033:0x458089 [ 3020.466760][ T4173] kobject: 'rx-0' (00000000fa59552a): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 3020.468769][ T4202] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3020.468778][ T4202] RSP: 002b:00007f712f5aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3020.468792][ T4202] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458089 [ 3020.468808][ T4202] RDX: 0000000020000140 RSI: 00000000c0481273 RDI: 0000000000000006 [ 3020.474612][ T4173] kobject: 'tx-0' (00000000cffeed70): kobject_add_internal: parent: 'queues', set: 'queues' [ 3020.478294][ T4202] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 3020.478303][ T4202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f712f5ab6d4 [ 3020.478312][ T4202] R13: 00000000004bf54d R14: 00000000004d0e38 R15: 00000000ffffffff [ 3020.478332][ T4202] Modules linked in: [ 3020.505877][ T4173] kobject: 'tx-0' (00000000cffeed70): kobject_uevent_env [ 3020.527938][ T4202] ---[ end trace 254dd4dded3cf47a ]--- [ 3020.585679][ T4173] kobject: 'tx-0' (00000000cffeed70): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 3020.592809][ T3865] kobject: 'loop5' (00000000237e3105): kobject_uevent_env [ 3020.605716][ T4182] kobject: 'tunl0' (00000000e70ffcdb): kobject_add_internal: parent: 'net', set: 'devices' [ 3020.609521][ T3865] kobject: 'loop5' (00000000237e3105): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3020.623312][ T4194] kobject: 'kvm' (00000000d0249d31): kobject_uevent_env [ 3020.647024][ T4202] RIP: 0010:relay_open_buf.part.0+0x7cb/0xb40 [ 3020.654072][ T4211] kobject: 'loop5' (00000000237e3105): kobject_uevent_env [ 3020.665002][ T4202] Code: c1 ea 03 80 3c 02 00 0f 85 4c 03 00 00 49 8d 7d 58 4d 89 ac 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 1b 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 3020.670691][ T4182] kobject: 'tunl0' (00000000e70ffcdb): kobject_uevent_env [ 3020.679319][ T4204] kobject: 'kvm' (00000000d0249d31): kobject_uevent_env [ 3020.686822][ T4211] kobject: 'loop5' (00000000237e3105): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3020.698742][ T4202] RSP: 0018:ffff88805020f670 EFLAGS: 00010203 [ 3020.706910][ T4182] kobject: 'tunl0' (00000000e70ffcdb): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 3020.713347][ T4204] kobject: 'kvm' (00000000d0249d31): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3020.719966][ T4182] kobject: 'queues' (000000005426da53): kobject_add_internal: parent: 'tunl0', set: '' [ 3020.729073][ T4202] RAX: dffffc0000000000 RBX: ffff8880539bf5c0 RCX: ffffc9000e878000 [ 3020.747536][ T4182] kobject: 'queues' (000000005426da53): kobject_uevent_env [ 3020.763981][ T4194] kobject: 'kvm' (00000000d0249d31): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3020.771318][ T4182] kobject: 'queues' (000000005426da53): kobject_uevent_env: filter function caused the event to drop! [ 3020.799617][ T4202] RDX: 0000000000000008 RSI: ffffffff81833b80 RDI: 0000000000000047 [ 3020.807157][ T4182] kobject: 'rx-0' (00000000196594c8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3020.822819][ T4211] kobject: 'loop5' (00000000237e3105): kobject_uevent_env [ 3020.832260][ T4182] kobject: 'rx-0' (00000000196594c8): kobject_uevent_env [ 3020.860785][ T4202] RBP: ffff88805020f6e8 R08: 0000000000000006 R09: ffff888055e2ce08 [ 3020.879226][ T4182] kobject: 'rx-0' (00000000196594c8): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 3020.894505][ T4211] kobject: 'loop5' (00000000237e3105): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3020.900392][ T4182] kobject: 'tx-0' (0000000074ac8650): kobject_add_internal: parent: 'queues', set: 'queues' [ 3020.918072][ T4182] kobject: 'tx-0' (0000000074ac8650): kobject_uevent_env [ 3020.926635][ T4182] kobject: 'tx-0' (0000000074ac8650): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 3020.929582][ T4202] R10: ffff888055e2c540 R11: 0000000000000000 R12: ffff88808ab115c0 [ 3020.941311][ T8870] kobject: 'gre0' (0000000027548328): kobject_cleanup, parent (null) [ 3020.960252][ T4194] kobject: 'kvm' (00000000d0249d31): kobject_uevent_env [ 3020.962896][ T4180] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3020.967313][ T4194] kobject: 'kvm' (00000000d0249d31): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3020.984283][ T8870] kobject: 'gre0' (0000000027548328): auto cleanup 'remove' event [ 3020.984291][ T8870] kobject: 'gre0' (0000000027548328): kobject_uevent_env [ 3020.984307][ T8870] kobject: 'gre0' (0000000027548328): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3020.992258][ T4202] R13: ffffffffffffffef R14: 0000000000000000 R15: 00000000000003a8 [ 3020.999537][ T4216] kobject: 'loop5' (00000000237e3105): kobject_uevent_env [ 3021.022135][ T4180] chnl_net:chnl_net_open(): err: Unable to register and open device, Err:-19 [ 3021.030944][ T4216] kobject: 'loop5' (00000000237e3105): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3021.036176][ T4202] FS: 00007f712f5ab700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 3021.047754][ T8870] kobject: 'gre0' (0000000027548328): calling ktype release [ 3021.061940][ T4180] caif:caif_disconnect_client(): nothing to disconnect [ 3021.064051][ T8870] kobject: 'gre0': free name [ 3021.068954][ T4202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3021.080247][ T4202] CR2: 00007f6f44483000 CR3: 0000000094f8a000 CR4: 00000000001426f0 [ 3021.088339][ T4202] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3021.092703][ T4216] EXT4-fs (sda1): re-mounted. Opts: [ 3021.096447][ T4202] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3021.109709][ T4202] Kernel panic - not syncing: Fatal exception [ 3021.116827][ T4202] Kernel Offset: disabled [ 3021.121145][ T4202] Rebooting in 86400 seconds..