Warning: Permanently added '10.128.0.209' (ECDSA) to the list of known hosts. 2021/02/24 05:31:49 fuzzer started 2021/02/24 05:31:49 dialing manager at 10.128.0.169:46215 2021/02/24 05:31:49 checking machine... 2021/02/24 05:31:49 checking revisions... 2021/02/24 05:31:50 testing simple program... [ 87.170420][ T35] audit: type=1400 audit(1614144710.400:8): avc: denied { execmem } for pid=8390 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 88.464674][ T8391] IPVS: ftp: loaded support on port[0] = 21 [ 88.660034][ T8391] chnl_net:caif_netlink_parms(): no params data found [ 88.720477][ T8391] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.729993][ T8391] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.739895][ T8391] device bridge_slave_0 entered promiscuous mode [ 88.751090][ T8391] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.758565][ T8391] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.766345][ T8391] device bridge_slave_1 entered promiscuous mode [ 88.789587][ T8391] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.800942][ T8391] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.827163][ T8391] team0: Port device team_slave_0 added [ 88.835980][ T8391] team0: Port device team_slave_1 added [ 88.855484][ T8391] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 88.863126][ T8391] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.889865][ T8391] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 88.903227][ T8391] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 88.913107][ T8391] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.940739][ T8391] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 88.971741][ T8391] device hsr_slave_0 entered promiscuous mode [ 88.980146][ T8391] device hsr_slave_1 entered promiscuous mode [ 89.132832][ T8391] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.144840][ T8391] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.156666][ T8391] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.169945][ T8391] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.222630][ T8391] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.230023][ T8391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.238832][ T8391] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.246192][ T8391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.335253][ T8391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.356587][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.372459][ T34] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.383329][ T34] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.392929][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 89.412139][ T8391] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.424982][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.439457][ T4088] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.448827][ T4088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.464711][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.473526][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.480683][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.501250][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.512971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.531620][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.544347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.560570][ T8391] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 89.574241][ T8391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.586074][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.606916][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 89.619312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.640367][ T8391] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.664046][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.675435][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready executing program [ 89.699804][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 89.709439][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.723188][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.733476][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.744579][ T8391] device veth0_vlan entered promiscuous mode [ 89.763027][ T8391] device veth1_vlan entered promiscuous mode [ 89.793403][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 89.803755][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 89.813403][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 89.823452][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 89.836438][ T8391] device veth0_macvtap entered promiscuous mode [ 89.847654][ T8391] device veth1_macvtap entered promiscuous mode [ 89.869067][ T8391] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 89.879063][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 89.890431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 89.899606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 89.908477][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 89.922890][ T8391] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.932917][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 89.942760][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.956916][ T8391] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.969468][ T8391] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.979301][ T8391] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.989596][ T8391] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.096885][ T105] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.119709][ T105] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.148468][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 90.171056][ T262] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.186435][ T262] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.200480][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2021/02/24 05:31:53 building call list... [ 91.044085][ T105] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program [ 92.876675][ T8378] can: request_module (can-proto-0) failed. [ 93.021699][ T105] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 95.059052][ T105] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 95.221219][ T105] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program [ 97.415941][ T105] device hsr_slave_0 left promiscuous mode [ 97.424262][ T105] device hsr_slave_1 left promiscuous mode [ 97.432239][ T105] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 97.440826][ T105] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 97.450805][ T105] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 97.458887][ T105] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 97.467826][ T105] device bridge_slave_1 left promiscuous mode [ 97.474951][ T105] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.489376][ T105] device bridge_slave_0 left promiscuous mode [ 97.495795][ T105] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.514364][ T105] device veth1_macvtap left promiscuous mode [ 97.522476][ T105] device veth0_macvtap left promiscuous mode [ 97.529823][ T105] device veth1_vlan left promiscuous mode [ 97.536014][ T105] device veth0_vlan left promiscuous mode executing program [ 101.032630][ T105] team0 (unregistering): Port device team_slave_1 removed [ 101.048066][ T105] team0 (unregistering): Port device team_slave_0 removed [ 101.061839][ T105] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 101.075431][ T105] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 101.125664][ T105] bond0 (unregistering): Released all slaves executing program [ 102.285555][ T8378] can: request_module (can-proto-0) failed. [ 102.299497][ T8378] can: request_module (can-proto-0) failed. [ 102.356394][ T35] audit: type=1400 audit(1614144725.580:9): avc: denied { create } for pid=8371 comm="syz-fuzzer" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 2021/02/24 05:32:06 syscalls: 3540 2021/02/24 05:32:06 code coverage: enabled 2021/02/24 05:32:06 comparison tracing: enabled 2021/02/24 05:32:06 extra coverage: enabled 2021/02/24 05:32:06 setuid sandbox: enabled 2021/02/24 05:32:06 namespace sandbox: enabled 2021/02/24 05:32:06 Android sandbox: enabled 2021/02/24 05:32:06 fault injection: enabled 2021/02/24 05:32:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/02/24 05:32:06 net packet injection: enabled 2021/02/24 05:32:06 net device setup: enabled 2021/02/24 05:32:06 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/02/24 05:32:06 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/02/24 05:32:06 USB emulation: enabled 2021/02/24 05:32:06 hci packet injection: enabled 2021/02/24 05:32:06 wifi device emulation: enabled 2021/02/24 05:32:06 802.15.4 emulation: enabled 2021/02/24 05:32:06 fetching corpus: 0, signal 0/0 (executing program) 2021/02/24 05:32:06 fetching corpus: 0, signal 0/0 (executing program) 2021/02/24 05:32:07 starting 6 fuzzer processes 05:32:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:32:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 05:32:08 executing program 2: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) 05:32:08 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:08 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) [ 105.656173][ T8736] IPVS: ftp: loaded support on port[0] = 21 05:32:08 executing program 5: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) [ 105.965757][ T8738] IPVS: ftp: loaded support on port[0] = 21 [ 106.261264][ T8740] IPVS: ftp: loaded support on port[0] = 21 [ 106.345168][ T8736] chnl_net:caif_netlink_parms(): no params data found [ 106.518813][ T8742] IPVS: ftp: loaded support on port[0] = 21 [ 106.721277][ T8738] chnl_net:caif_netlink_parms(): no params data found [ 106.813795][ T8744] IPVS: ftp: loaded support on port[0] = 21 [ 106.839010][ T8736] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.846233][ T8736] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.868126][ T8736] device bridge_slave_0 entered promiscuous mode [ 106.907997][ T8736] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.915119][ T8736] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.928476][ T8736] device bridge_slave_1 entered promiscuous mode [ 107.002247][ T8736] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.064955][ T8736] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.108277][ T8740] chnl_net:caif_netlink_parms(): no params data found [ 107.169110][ T8736] team0: Port device team_slave_0 added [ 107.185860][ T8738] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.196674][ T8738] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.208323][ T8738] device bridge_slave_0 entered promiscuous mode [ 107.221589][ T8736] team0: Port device team_slave_1 added [ 107.251705][ T8738] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.259617][ T8738] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.269239][ T8738] device bridge_slave_1 entered promiscuous mode [ 107.340672][ T8736] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 107.350766][ T8736] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 107.379227][ T8736] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 107.479199][ T8736] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 107.497040][ T8736] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 107.530769][ T8736] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 107.560714][ T8838] IPVS: ftp: loaded support on port[0] = 21 [ 107.574357][ T8738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 107.663262][ T8738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.680583][ T5] Bluetooth: hci0: command 0x0409 tx timeout [ 107.790934][ T8742] chnl_net:caif_netlink_parms(): no params data found [ 107.809211][ T8736] device hsr_slave_0 entered promiscuous mode [ 107.817564][ T8736] device hsr_slave_1 entered promiscuous mode [ 107.824607][ T8740] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.833001][ T8740] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.841916][ T8740] device bridge_slave_0 entered promiscuous mode [ 107.894312][ T8740] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.902916][ T8740] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.911575][ T8740] device bridge_slave_1 entered promiscuous mode [ 107.920340][ T8744] chnl_net:caif_netlink_parms(): no params data found [ 107.927318][ T4088] Bluetooth: hci1: command 0x0409 tx timeout [ 107.940356][ T8738] team0: Port device team_slave_0 added [ 107.951795][ T8738] team0: Port device team_slave_1 added [ 108.043301][ T8740] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.057497][ T8738] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 108.064470][ T8738] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.092916][ T8738] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 108.134179][ T8740] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.151497][ T8738] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 108.159977][ T19] Bluetooth: hci2: command 0x0409 tx timeout [ 108.172844][ T8738] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.201120][ T8738] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 108.315400][ T8738] device hsr_slave_0 entered promiscuous mode [ 108.322808][ T8738] device hsr_slave_1 entered promiscuous mode [ 108.331821][ T8738] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 108.340477][ T8738] Cannot create hsr debugfs directory [ 108.363052][ T8740] team0: Port device team_slave_0 added [ 108.373225][ T8740] team0: Port device team_slave_1 added [ 108.412600][ T8742] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.420107][ T8742] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.428724][ T8742] device bridge_slave_0 entered promiscuous mode [ 108.477849][ T8612] Bluetooth: hci3: command 0x0409 tx timeout [ 108.484917][ T8742] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.494361][ T8742] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.506372][ T8742] device bridge_slave_1 entered promiscuous mode [ 108.568495][ T8740] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 108.575475][ T8740] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.603479][ T8740] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 108.615504][ T8744] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.622755][ T8744] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.632669][ T8744] device bridge_slave_0 entered promiscuous mode [ 108.726288][ T19] Bluetooth: hci4: command 0x0409 tx timeout [ 108.743396][ T8740] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 108.751737][ T8740] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 108.779597][ T8740] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 108.791541][ T8744] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.799387][ T8744] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.809623][ T8744] device bridge_slave_1 entered promiscuous mode [ 108.838649][ T8742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.886692][ T8742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.920050][ T8838] chnl_net:caif_netlink_parms(): no params data found [ 108.932061][ T8744] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.946320][ T8744] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.984689][ T8742] team0: Port device team_slave_0 added [ 109.017641][ T8740] device hsr_slave_0 entered promiscuous mode [ 109.028100][ T8740] device hsr_slave_1 entered promiscuous mode [ 109.034780][ T8740] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 109.043502][ T8740] Cannot create hsr debugfs directory [ 109.057559][ T8742] team0: Port device team_slave_1 added [ 109.135797][ T8744] team0: Port device team_slave_0 added [ 109.160190][ T8742] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 109.167574][ T8742] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.194709][ T8742] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 109.208625][ T8744] team0: Port device team_slave_1 added [ 109.260539][ T8742] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 109.268361][ T8742] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.297006][ T8742] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 109.351745][ T8838] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.361780][ T8838] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.372437][ T8838] device bridge_slave_0 entered promiscuous mode [ 109.425121][ T8838] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.432710][ T8838] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.442880][ T8838] device bridge_slave_1 entered promiscuous mode [ 109.449881][ T8611] Bluetooth: hci5: command 0x0409 tx timeout [ 109.452057][ T8744] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 109.464446][ T8744] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.490904][ T8744] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 109.520234][ T8742] device hsr_slave_0 entered promiscuous mode [ 109.532290][ T8742] device hsr_slave_1 entered promiscuous mode [ 109.539217][ T8742] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 109.546785][ T8742] Cannot create hsr debugfs directory [ 109.590829][ T8744] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 109.598600][ T8744] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 109.625122][ T8744] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 109.664773][ T8838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 109.688089][ T8838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 109.757242][ T4088] Bluetooth: hci0: command 0x041b tx timeout [ 109.761778][ T8738] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 109.805226][ T8744] device hsr_slave_0 entered promiscuous mode [ 109.815329][ T8744] device hsr_slave_1 entered promiscuous mode [ 109.823299][ T8744] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 109.831638][ T8744] Cannot create hsr debugfs directory [ 109.841574][ T8838] team0: Port device team_slave_0 added [ 109.849067][ T8738] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 109.863325][ T8738] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 109.905650][ T8838] team0: Port device team_slave_1 added [ 109.924452][ T8738] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 109.997138][ T19] Bluetooth: hci1: command 0x041b tx timeout [ 110.016529][ T8838] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 110.028732][ T8838] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.056712][ T8838] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 110.075170][ T8838] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 110.082896][ T8838] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.110056][ T8838] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 110.231651][ T8736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.247619][ T4088] Bluetooth: hci2: command 0x041b tx timeout [ 110.259344][ T8838] device hsr_slave_0 entered promiscuous mode [ 110.266672][ T8838] device hsr_slave_1 entered promiscuous mode [ 110.277311][ T8838] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 110.285670][ T8838] Cannot create hsr debugfs directory [ 110.408881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.427699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.450722][ T8740] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 110.468495][ T8740] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 110.494243][ T8740] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 110.520694][ T8736] 8021q: adding VLAN 0 to HW filter on device team0 [ 110.537070][ T8740] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 110.566963][ T34] Bluetooth: hci3: command 0x041b tx timeout [ 110.567326][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.587932][ T3126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.597766][ T3126] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.605727][ T3126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.620822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.684120][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.694189][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.705113][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.712277][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.780212][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.790639][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.801836][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.811935][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.823206][ T8742] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 110.830629][ T34] Bluetooth: hci4: command 0x041b tx timeout [ 110.872160][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.881939][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.891377][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.900888][ T8742] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 110.927920][ T8738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.944862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.954983][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.969564][ T8742] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 111.013394][ T8742] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 111.023112][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.039309][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.048911][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.056606][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.066631][ T8736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.092532][ T8738] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.160443][ T8744] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 111.207294][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.221283][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.230822][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.238018][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.247766][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.256742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.265831][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.273038][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.288863][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.298955][ T8744] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 111.348244][ T8740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.355366][ T8744] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 111.366290][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.386223][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.397819][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 111.405619][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 111.424813][ T8838] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 111.443616][ T8838] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 111.457361][ T8744] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 111.481769][ T8838] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 111.496767][ T8736] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 111.517468][T10006] Bluetooth: hci5: command 0x041b tx timeout [ 111.518061][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.542970][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.557978][ T8838] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 111.595479][ T8740] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.606175][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.617369][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.629071][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.638796][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.649068][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.700118][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.712485][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.723571][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.733791][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.743385][T10006] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.750743][T10006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.794006][ T8738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.814543][ T8738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.835757][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.844986][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.854982][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.865171][T10006] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.872403][T10006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.881039][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.890265][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.899531][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.909280][T10037] Bluetooth: hci0: command 0x040f tx timeout [ 111.947693][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.970891][ T8742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.015726][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.029841][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.040393][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.049030][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 112.056725][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.067253][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.079827][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.089132][ T34] Bluetooth: hci1: command 0x040f tx timeout [ 112.107145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.116118][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.141906][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.150916][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.170565][ T8738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.198944][ T8742] 8021q: adding VLAN 0 to HW filter on device team0 [ 112.216145][ T8736] device veth0_vlan entered promiscuous mode [ 112.229560][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.239204][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.249404][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.258721][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.275504][ T8740] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 112.291195][ T8740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.313515][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.324234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.327049][ T34] Bluetooth: hci2: command 0x040f tx timeout [ 112.336636][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.348716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.360720][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.369613][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.378855][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.385982][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.394495][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.427242][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.444072][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.453188][ T8611] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.460426][ T8611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.473798][ T8611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 112.519180][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 112.530064][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 112.542529][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 112.556223][ T8736] device veth1_vlan entered promiscuous mode [ 112.592045][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 112.602958][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 112.628271][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 112.649597][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 112.669558][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.681955][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.694639][ T34] Bluetooth: hci3: command 0x040f tx timeout [ 112.741868][ T8744] 8021q: adding VLAN 0 to HW filter on device bond0 [ 112.770884][ T8740] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 112.780703][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 112.790274][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 112.801523][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 112.809929][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.821305][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.869343][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.880279][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.891419][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.901631][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.910953][ T19] Bluetooth: hci4: command 0x040f tx timeout [ 112.919057][ T8742] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 112.943887][ T8738] device veth0_vlan entered promiscuous mode [ 112.966327][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.974667][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.983628][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.992248][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.010146][ T8744] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.072424][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.085540][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.094760][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.101912][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.112090][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.124098][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.133145][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.140274][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.149395][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.159510][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.169057][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.203656][ T8738] device veth1_vlan entered promiscuous mode [ 113.215934][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.226461][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 113.237657][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 113.246637][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 113.255752][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 113.272554][ T8742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 113.285595][ T8838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 113.309838][ T8736] device veth0_macvtap entered promiscuous mode [ 113.323482][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.336416][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.348490][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 113.404509][ T8736] device veth1_macvtap entered promiscuous mode [ 113.412085][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.423541][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.433031][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.443147][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.451876][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 113.461261][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.470226][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 113.479829][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 113.489160][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 113.499106][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 113.508831][ T8740] device veth0_vlan entered promiscuous mode [ 113.520332][ T8838] 8021q: adding VLAN 0 to HW filter on device team0 [ 113.557386][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.568750][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.580903][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 113.589168][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.600591][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.607796][T10006] Bluetooth: hci5: command 0x040f tx timeout [ 113.609954][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 113.623655][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.641912][ T8738] device veth0_macvtap entered promiscuous mode [ 113.668025][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 113.676360][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 113.687158][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.694794][ T8740] device veth1_vlan entered promiscuous mode [ 113.730354][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 113.739703][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.754912][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.765031][T10027] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.772368][T10027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.782192][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 113.791021][T10027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.809601][ T8738] device veth1_macvtap entered promiscuous mode [ 113.826721][ T8744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 113.842941][ T8736] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 113.853209][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 113.862222][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.872606][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.882679][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.891969][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.901914][T10011] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.909644][T10011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.917771][T10005] Bluetooth: hci0: command 0x0419 tx timeout [ 113.918968][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.934820][T10011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.985377][ T8736] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 114.005551][ T8742] device veth0_vlan entered promiscuous mode [ 114.022137][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 114.041729][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.058945][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 114.071646][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.084287][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.096140][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.105490][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.135102][ T8738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.147858][ T8738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.160106][ T34] Bluetooth: hci1: command 0x0419 tx timeout [ 114.170136][ T8738] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 114.184559][ T8738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.195902][ T8738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.208284][ T8738] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 114.223538][ T8738] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.232660][ T8738] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.243035][ T8738] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.252087][ T8738] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.268156][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 114.288044][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 114.296662][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 114.305852][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 114.314907][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.324857][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 114.334599][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.344380][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 114.354113][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.378563][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 114.388360][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 114.395883][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 114.409754][T10005] Bluetooth: hci2: command 0x0419 tx timeout [ 114.413485][ T8740] device veth0_macvtap entered promiscuous mode [ 114.438221][ T8744] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 114.445451][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 114.455757][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 114.470404][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 114.482358][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.492391][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.531566][ T8740] device veth1_macvtap entered promiscuous mode [ 114.583425][ T8838] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 114.601748][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 114.613083][ T8742] device veth1_vlan entered promiscuous mode [ 114.647705][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 114.656175][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 114.673116][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.684889][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.718062][T10044] Bluetooth: hci3: command 0x0419 tx timeout [ 114.786243][ T8740] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.814236][ T8740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.832840][ T8740] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 114.849876][ T8740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.863183][ T8740] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 114.881186][ T8740] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.906833][ T8740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.916688][ T8740] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 114.939186][ T8740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 114.958956][T10005] Bluetooth: hci4: command 0x0419 tx timeout [ 114.972275][ T8740] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 114.982295][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 114.994823][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 115.009259][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 115.024352][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.034724][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.045411][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.059334][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.092931][ T8838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 115.124980][ T8740] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.154327][ T8740] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.186844][ T8740] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.195662][ T8740] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.282707][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.292372][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.343782][ T105] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.359723][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.379335][ T105] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.390477][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.405979][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 115.418725][ T8742] device veth0_macvtap entered promiscuous mode [ 115.458755][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 115.502986][ T8742] device veth1_macvtap entered promiscuous mode [ 115.513677][ T105] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.537244][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.545938][ T105] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.547884][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.566733][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.656988][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 115.665366][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.675778][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.690418][T10044] Bluetooth: hci5: command 0x0419 tx timeout [ 115.724144][ T8744] device veth0_vlan entered promiscuous mode [ 115.782765][ T105] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 115.784439][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 115.805032][ T105] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 115.813524][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.837080][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 115.851741][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.862862][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 115.873987][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 115.885924][ T8742] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 115.910909][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 115.938497][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.950950][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.962064][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.972094][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.022590][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.035968][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.049009][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.059869][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.069926][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 116.081562][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 116.095872][ T8742] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 116.129613][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.145824][ T8744] device veth1_vlan entered promiscuous mode [ 116.146534][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.167947][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 05:32:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 116.180029][T10037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.214009][ T8742] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.240875][ T8742] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.252315][ T8742] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.262482][ T8742] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.284634][ T8838] device veth0_vlan entered promiscuous mode [ 116.313990][ T155] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.324427][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 116.339436][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 116.349612][ T155] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.358856][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.375174][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:32:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 116.425823][ T8838] device veth1_vlan entered promiscuous mode [ 116.500612][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.514861][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.542373][T10006] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 05:32:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 116.615451][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 116.630456][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 05:32:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) [ 116.668878][ T4088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.695731][ T147] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 116.790270][ T147] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 116.791906][ T8744] device veth0_macvtap entered promiscuous mode 05:32:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) [ 116.907401][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 116.926431][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 116.951722][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.972288][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.996979][ T8744] device veth1_macvtap entered promiscuous mode 05:32:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) [ 117.027774][ T8838] device veth0_macvtap entered promiscuous mode [ 117.057180][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 117.093578][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 117.128333][ T8838] device veth1_macvtap entered promiscuous mode [ 117.177299][ T147] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 05:32:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) [ 117.257088][ T147] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 05:32:20 executing program 2: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) [ 117.321154][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.347353][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 05:32:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) [ 117.367140][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.392536][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.413220][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.434441][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.450846][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.471221][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.494356][ T8744] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 117.534096][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 117.550274][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 117.605446][T10005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 117.645398][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 117.671867][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.693374][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 117.712693][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.736535][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 117.758897][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.792111][ T8744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 117.829208][ T8744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.852666][ T8744] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 117.875766][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.898555][ T105] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 117.917511][ T105] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 117.929356][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.952825][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 117.977985][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 117.989157][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 118.016901][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.065643][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 118.095606][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.116798][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 118.135644][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.150889][ T8838] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 118.160673][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 118.178726][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.197565][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 118.205700][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 118.225517][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.259265][ T8744] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.275479][ T8744] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.285121][ T8744] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.300020][ T8744] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.324911][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 118.343015][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.354482][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 118.366194][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.377073][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 118.388348][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.400287][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 118.414395][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.427826][ T8838] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 118.440429][ T8838] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 118.454135][ T8838] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 118.471173][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 118.484331][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.513846][ T8838] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.524357][ T8838] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.544390][ T8838] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.555536][ T8838] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.732335][ C0] hrtimer: interrupt took 25445 ns [ 118.928883][ T147] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 118.988633][ T147] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 119.030562][ T105] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 119.062005][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 119.081603][T10175] IPVS: ftp: loaded support on port[0] = 21 [ 119.098118][ T105] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 119.133937][ T262] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 119.152664][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 119.184464][ T262] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 119.202913][ T105] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 119.232429][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 119.252392][ T105] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 119.295671][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:32:24 executing program 0: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) 05:32:24 executing program 2: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) 05:32:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:32:24 executing program 5: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:32:24 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:32:24 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:24 executing program 2: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) 05:32:24 executing program 0: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) 05:32:24 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 121.713681][T10279] IPVS: ftp: loaded support on port[0] = 21 05:32:25 executing program 5: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:32:25 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:25 executing program 0: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) [ 122.044949][T10287] IPVS: ftp: loaded support on port[0] = 21 05:32:25 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 122.280970][T10293] IPVS: ftp: loaded support on port[0] = 21 05:32:25 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:32:25 executing program 5: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) [ 122.618304][T10313] IPVS: ftp: loaded support on port[0] = 21 05:32:26 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:26 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 123.339921][T10379] IPVS: ftp: loaded support on port[0] = 21 [ 123.817314][T10409] IPVS: ftp: loaded support on port[0] = 21 05:32:32 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:32 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:32:32 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 129.556245][T10472] IPVS: ftp: loaded support on port[0] = 21 05:32:33 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 129.864338][T10475] IPVS: ftp: loaded support on port[0] = 21 05:32:33 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 130.150945][T10489] IPVS: ftp: loaded support on port[0] = 21 [ 130.459738][T10508] IPVS: ftp: loaded support on port[0] = 21 05:32:33 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:34 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:34 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 131.071244][T10576] IPVS: ftp: loaded support on port[0] = 21 05:32:34 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 131.334645][T10591] IPVS: ftp: loaded support on port[0] = 21 [ 131.375952][T10597] IPVS: ftp: loaded support on port[0] = 21 [ 131.656395][T10609] IPVS: ftp: loaded support on port[0] = 21 05:32:35 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 132.560318][ T3218] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.567165][ T3218] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.717242][T10691] IPVS: ftp: loaded support on port[0] = 21 05:32:36 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 133.903206][T10722] IPVS: ftp: loaded support on port[0] = 21 05:32:37 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 134.980887][T10746] IPVS: ftp: loaded support on port[0] = 21 05:32:41 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:41 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:41 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 138.304646][T10774] IPVS: ftp: loaded support on port[0] = 21 [ 138.344879][T10772] IPVS: ftp: loaded support on port[0] = 21 [ 138.543960][T10776] IPVS: ftp: loaded support on port[0] = 21 05:32:42 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:42 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:42 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 139.838539][T10857] IPVS: ftp: loaded support on port[0] = 21 [ 139.863126][T10856] IPVS: ftp: loaded support on port[0] = 21 [ 139.907043][T10860] IPVS: ftp: loaded support on port[0] = 21 05:32:49 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:49 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:49 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 146.258822][T10960] IPVS: ftp: loaded support on port[0] = 21 [ 146.397084][T10962] IPVS: ftp: loaded support on port[0] = 21 [ 146.532095][T10964] IPVS: ftp: loaded support on port[0] = 21 05:32:50 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 147.834961][T11039] IPVS: ftp: loaded support on port[0] = 21 05:32:51 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:51 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 148.272566][T11064] IPVS: ftp: loaded support on port[0] = 21 [ 148.439225][T11063] IPVS: ftp: loaded support on port[0] = 21 05:32:52 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:52 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 149.116381][T11112] IPVS: ftp: loaded support on port[0] = 21 05:32:52 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 149.490261][T11130] IPVS: ftp: loaded support on port[0] = 21 05:32:52 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 149.717833][T11147] IPVS: ftp: loaded support on port[0] = 21 [ 150.044899][T11161] IPVS: ftp: loaded support on port[0] = 21 05:32:53 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 150.970105][T11220] IPVS: ftp: loaded support on port[0] = 21 05:32:54 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 152.049743][T11254] IPVS: ftp: loaded support on port[0] = 21 05:32:58 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:58 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:58 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:58 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 155.072552][T11292] IPVS: ftp: loaded support on port[0] = 21 [ 155.084507][T11293] IPVS: ftp: loaded support on port[0] = 21 [ 155.114554][T11294] IPVS: ftp: loaded support on port[0] = 21 [ 155.248868][T11295] IPVS: ftp: loaded support on port[0] = 21 05:32:59 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:59 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:32:59 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 156.254578][T11383] IPVS: ftp: loaded support on port[0] = 21 [ 156.322001][T11384] IPVS: ftp: loaded support on port[0] = 21 [ 156.342360][T11385] IPVS: ftp: loaded support on port[0] = 21 05:33:00 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:00 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:00 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:00 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 157.813495][T11471] IPVS: ftp: loaded support on port[0] = 21 [ 157.865909][T11470] IPVS: ftp: loaded support on port[0] = 21 [ 157.907900][T11472] IPVS: ftp: loaded support on port[0] = 21 [ 158.136070][T11475] IPVS: ftp: loaded support on port[0] = 21 05:33:07 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:07 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 164.503381][T11580] IPVS: ftp: loaded support on port[0] = 21 [ 164.534189][T11581] IPVS: ftp: loaded support on port[0] = 21 05:33:08 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 165.659560][T11631] IPVS: ftp: loaded support on port[0] = 21 05:33:08 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:08 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:09 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:09 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) [ 166.133658][T11645] IPVS: ftp: loaded support on port[0] = 21 [ 166.229393][T11653] IPVS: ftp: loaded support on port[0] = 21 [ 166.245037][T11661] IPVS: ftp: loaded support on port[0] = 21 05:33:10 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:10 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:10 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:10 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:11 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:15 executing program 0: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:15 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) [ 172.861905][T11788] IPVS: ftp: loaded support on port[0] = 21 05:33:16 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:16 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:16 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:16 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:16 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:16 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) [ 173.876759][T11820] IPVS: ftp: loaded support on port[0] = 21 [ 173.914289][T11825] IPVS: ftp: loaded support on port[0] = 21 [ 173.956684][T11823] IPVS: ftp: loaded support on port[0] = 21 05:33:18 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:18 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:18 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:19 executing program 4: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:19 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:19 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:23 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffd) mknod(0x0, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r0, r1) r2 = open(0x0, 0x525002, 0x5d) dup(0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x3ff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000006c0)=ANY=[@ANYBLOB="05000000000000000100000000000000842281d746b6b4c00600000000000000010001000000000008000000000000000600000000000000000000002f2ea810343ed4000000000000000000000000000400000000000000000000000000000000000000000000010000000000000005000000000000000000000000000000000000000000000004000400000000000000000000000000ff7fffffffffff080000000000000000000000000000000000000000000000080400000000000000000000000000000000010000000000d7090000000000000600000000000000000000000000000000000000000000008f0400000000000000000000000000000000000000000000020000000000000000a00000000000000000000000000000000000000000000008040000d600000000000000000000000180000001000000000000000000000000000000000000000902000000000000000000000000000044bc5380f5ffa304bdae9dc7814922b8285218f25e03578c31a14dc0718eae90b580a5e062fbe01b98cbce74308c1484d8d3f8cf6ce7e57db8dcf195ad70cfcabeb4a4d6abf1201f5c2eafdb3523f1050af7d569480356302b815fd4632dbc8079af634e3fe8758179e01c66d9144bdc859141c531c44212b68860dfdf21348a087bfdb9efdbd408bdff9e0421000000000000e3780bcdb0feed0d0000000000002164587ef97751010f7bfbddebb5a13944afc4cc9e637e3e440ea511094978a12caf8b44c124b6405ea4929ce9efe76171ea61f7799a08f05b14d462432e035bbd3035ae074f868b24a36830ef09"]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000005000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000006000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0}, 0x68) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0xfff7ffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x750, {0x2, 0x2000, @local}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e20, @broadcast}, 0x132, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2, 0x3ffffffffffffffd}) keyctl$assume_authority(0x10, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000100)=0x7f, 0x4) unshare(0x60000000) 05:33:23 executing program 4: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:23 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:23 executing program 0: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:23 executing program 2: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:23 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) 05:33:23 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) [ 180.255956][T11952] IPVS: ftp: loaded support on port[0] = 21 05:33:23 executing program 4: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:23 executing program 3: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r1, r0, 0x0) 05:33:23 executing program 0: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:23 executing program 2: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:24 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x300000f, 0x200000005c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000180), 0x0, 0xfffffffffffffffb, &(0x7f0000499000/0x2000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000001) madvise(&(0x7f000046a000/0x2000)=nil, 0x2000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000109000/0x3000)=nil, 0x3000, 0x65) 05:33:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:24 executing program 4: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:24 executing program 2: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:24 executing program 0: add_key(&(0x7f0000000180)='asymmetric\x00', 0x0, &(0x7f0000000000)="0400f3cee702117d16bed7665aa5cef43bad29c6cbae0d403dfc5d3dc8f660f492fd", 0x22, 0xfffffffffffffffc) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 05:33:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 05:33:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:26 executing program 1: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 05:33:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 183.572628][ T35] audit: type=1400 audit(1614144806.801:10): avc: denied { block_suspend } for pid=12062 comm="syz-executor.0" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 05:33:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:27 executing program 1: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 05:33:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x2f) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(r1, &(0x7f0000000900)={0x2c, 0x0, r3}, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 05:33:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 05:33:27 executing program 1: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 05:33:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:28 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:28 executing program 4: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 05:33:28 executing program 1: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 05:33:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:28 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:28 executing program 4: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 05:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:28 executing program 4: pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x0) 05:33:28 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:28 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001, 0xe031010000000000}) poll(&(0x7f0000000040)=[{}, {r0, 0x1008}], 0x2, 0x0) 05:33:33 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:33 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:33 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:33 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:33 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:34 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:34 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:35 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) 05:33:36 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xd91e0, 0x0, 0x53) [ 231.916477][ T34] Bluetooth: hci2: command 0x0406 tx timeout [ 231.922601][ T34] Bluetooth: hci4: command 0x0406 tx timeout [ 231.948906][ T34] Bluetooth: hci5: command 0x0406 tx timeout [ 291.806209][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 291.812863][ C0] rcu: 0-....: (1 GPs behind) idle=bd2/1/0x4000000000000000 softirq=18627/18628 fqs=5077 [ 291.824155][ C0] (t=10500 jiffies g=28013 q=3136) [ 291.829360][ C0] NMI backtrace for cpu 0 [ 291.833672][ C0] CPU: 0 PID: 12168 Comm: syz-executor.1 Not tainted 5.11.0-syzkaller #0 [ 291.842156][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.852211][ C0] Call Trace: [ 291.856653][ C0] [ 291.859494][ C0] dump_stack+0xfa/0x151 [ 291.864078][ C0] nmi_cpu_backtrace.cold+0x44/0xd7 [ 291.869359][ C0] ? lapic_can_unplug_cpu+0x80/0x80 [ 291.874605][ C0] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 291.880661][ C0] rcu_dump_cpu_stacks+0x222/0x2a7 [ 291.885921][ C0] rcu_sched_clock_irq.cold+0x4f7/0x11dd [ 291.891561][ C0] ? lock_release+0x3bb/0x710 [ 291.896292][ C0] ? rcutree_dead_cpu+0x50/0x50 [ 291.901208][ C0] ? lock_downgrade+0x6d0/0x6d0 [ 291.906055][ C0] ? lock_is_held_type+0xd5/0x130 [ 291.911356][ C0] update_process_times+0x16d/0x200 [ 291.916992][ C0] tick_sched_handle+0x9b/0x180 [ 291.922639][ C0] tick_sched_timer+0x1b0/0x2d0 [ 291.927492][ C0] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 291.933134][ C0] __hrtimer_run_queues+0x1c0/0xe40 [ 291.938458][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 291.944552][ C0] ? ktime_get_update_offsets_now+0x262/0x340 [ 291.951785][ C0] hrtimer_interrupt+0x334/0x940 [ 291.958342][ C0] __sysvec_apic_timer_interrupt+0x146/0x540 [ 291.964660][ C0] asm_call_irq_on_stack+0xf/0x20 [ 291.969764][ C0] [ 291.972708][ C0] sysvec_apic_timer_interrupt+0xbd/0x100 [ 291.979567][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 291.986737][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 [ 291.992974][ C0] Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 cc 14 00 00 85 c0 74 2b 8b 82 a8 14 00 00 <83> f8 02 75 20 48 8b 8a b0 14 00 00 8b 92 ac 14 00 00 48 8b 01 48 [ 292.013043][ C0] RSP: 0018:ffffc900021c7110 EFLAGS: 00000246 [ 292.019117][ C0] RAX: 0000000000000002 RBX: ffffc900021c7460 RCX: 0000000000000000 [ 292.027136][ C0] RDX: ffff8880276641c0 RSI: ffffffff81901401 RDI: 0000000000000003 [ 292.035245][ C0] RBP: 0000000000000008 R08: 0000000000000000 R09: ffff88805cb3f0bf [ 292.043230][ C0] R10: ffffffff81901352 R11: 0000000000000001 R12: ffffc900021c7250 [ 292.051365][ C0] R13: dffffc0000000000 R14: 1ffff92000438e91 R15: ffff88805cb3f000 [ 292.059351][ C0] ? perf_output_read+0xc92/0x1310 [ 292.064575][ C0] ? perf_output_read+0xd41/0x1310 [ 292.069684][ C0] perf_output_read+0xd41/0x1310 [ 292.074621][ C0] ? ring_buffer_wakeup+0x2b0/0x2b0 [ 292.079816][ C0] ? lock_acquire+0x1bb/0x730 [ 292.084487][ C0] ? lock_release+0x710/0x710 [ 292.089156][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 292.095310][ C0] ? memcpy+0x39/0x60 [ 292.099379][ C0] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 292.105619][ C0] ? perf_output_copy+0x188/0x230 [ 292.110653][ C0] perf_output_sample+0xd12/0x1be0 [ 292.115763][ C0] ? perf_output_begin_forward+0x519/0xad0 [ 292.121588][ C0] ? perf_event__output_id_sample+0x80/0x80 [ 292.127478][ C0] ? perf_callchain+0x1c0/0x1c0 [ 292.132323][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 292.137597][ C0] perf_event_output_forward+0x132/0x270 [ 292.143236][ C0] ? perf_prepare_sample+0x1e90/0x1e90 [ 292.148695][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 292.153895][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 292.160070][ C0] __perf_event_overflow+0x13c/0x370 [ 292.165372][ C0] perf_swevent_event+0x347/0x550 [ 292.170393][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 292.176651][ C0] ___perf_sw_event+0x31a/0x570 [ 292.181513][ C0] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 292.187940][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 292.192880][ C0] ? do_raw_spin_unlock+0x171/0x230 [ 292.198111][ C0] ? _raw_spin_unlock+0x24/0x40 [ 292.203001][ C0] ? __handle_mm_fault+0x93c/0x4e00 [ 292.208271][ C0] ? vm_iomap_memory+0x190/0x190 [ 292.213223][ C0] ? __perf_sw_event+0x54/0x130 [ 292.218066][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 292.224328][ C0] ? perf_swevent_get_recursion_context+0xfd/0x140 [ 292.230909][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 292.237146][ C0] __perf_sw_event+0x54/0x130 [ 292.243126][ C0] handle_mm_fault+0x5da/0x7e0 [ 292.248027][ C0] do_user_addr_fault+0x483/0x1210 [ 292.253152][ C0] exc_page_fault+0x9e/0x180 [ 292.257741][ C0] asm_exc_page_fault+0x1e/0x30 [ 292.262607][ C0] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 292.269196][ C0] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 292.288810][ C0] RSP: 0018:ffffc900021c79c8 EFLAGS: 00010206 [ 292.294890][ C0] RAX: 0000000000000001 RBX: 0000000000008000 RCX: 0000000000002fcb [ 292.302875][ C0] RDX: 0000000000008000 RSI: 0000000020f9a000 RDI: ffff88805b2b5035 [ 292.310864][ C0] RBP: ffff88805b2b0000 R08: 0000000000000001 R09: ffff88805b2b7fff [ 292.318840][ C0] R10: ffffed100b656fff R11: 0000000000000000 R12: 0000000020f94fcb [ 292.326821][ C0] R13: 0000000020f9cfcb R14: 0000000000000000 R15: 0000000000000000 [ 292.334807][ C0] copyin.part.0+0xe4/0x110 [ 292.339398][ C0] _copy_from_iter_full+0x22c/0x850 [ 292.344613][ C0] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 292.350845][ C0] ? __phys_addr_symbol+0x2c/0x70 [ 292.355864][ C0] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 292.361588][ C0] ? __check_object_size+0x171/0x3f0 [ 292.366962][ C0] skb_do_copy_data_nocache+0x145/0x2c0 [ 292.372555][ C0] ? tcp_poll+0xf40/0xf40 [ 292.376902][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 292.383143][ C0] tcp_sendmsg_locked+0x1360/0x2e40 [ 292.388355][ C0] ? tcp_remove_empty_skb+0x8a0/0x8a0 [ 292.393748][ C0] ? __local_bh_enable_ip+0xa8/0x110 [ 292.399106][ C0] tcp_sendmsg+0x2b/0x40 [ 292.403524][ C0] inet_sendmsg+0x99/0xe0 [ 292.407938][ C0] ? inet_send_prepare+0x4d0/0x4d0 [ 292.413062][ C0] sock_sendmsg+0xcf/0x120 [ 292.417557][ C0] __sys_sendto+0x21c/0x320 [ 292.422069][ C0] ? __ia32_sys_getpeername+0xb0/0xb0 [ 292.427443][ C0] ? lock_release+0x3bb/0x710 [ 292.432132][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 292.438381][ C0] ? clockevents_program_event+0x12b/0x370 [ 292.444376][ C0] ? tick_program_event+0xb4/0x140 [ 292.450190][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 292.456451][ C0] ? hrtimer_interrupt+0x6f4/0x940 [ 292.461568][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 292.466775][ C0] ? sched_clock+0x2a/0x40 [ 292.471256][ C0] __x64_sys_sendto+0xdd/0x1b0 [ 292.476013][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 292.481222][ C0] ? syscall_enter_from_user_mode+0x1d/0x50 [ 292.487124][ C0] do_syscall_64+0x2d/0x70 [ 292.491574][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.497465][ C0] RIP: 0033:0x465ef9 [ 292.501377][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 292.521011][ C0] RSP: 002b:00007f09ff0b6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 292.529440][ C0] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 292.537443][ C0] RDX: ffffffffffffffef RSI: 0000000020d7cfcb RDI: 0000000000000006 [ 292.545434][ C0] RBP: 00000000004bcd1c R08: 0000000000000000 R09: 0000000000000053 [ 292.553573][ C0] R10: 00000000000d91e0 R11: 0000000000000246 R12: 000000000056bf60 [ 292.561564][ C0] R13: 00007ffff3ef2fbf R14: 00007f09ff0b6300 R15: 0000000000022000 [ 296.396334][T11275] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10713 jiffies s: 12073 root: 0x1/. [ 296.426216][T11275] rcu: blocking rcu_node structures (internal RCU debug): [ 296.433385][T11275] Task dump for CPU 0: [ 296.447000][T11275] task:syz-executor.1 state:R running task stack:26400 pid:12168 ppid: 8738 flags:0x0000400e [ 296.466310][T11275] Call Trace: [ 296.469655][T11275] ? do_raw_spin_unlock+0x171/0x230 [ 296.474893][T11275] ? _raw_spin_unlock+0x24/0x40 [ 296.491516][T11275] ? __handle_mm_fault+0x93c/0x4e00 [ 296.500868][T11275] ? vm_iomap_memory+0x190/0x190 [ 296.505869][T11275] ? __perf_sw_event+0x54/0x130 [ 296.523254][T11275] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 296.534013][T11275] ? perf_swevent_get_recursion_context+0xfd/0x140 [ 296.550443][T11275] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 296.562210][T11275] ? __perf_sw_event+0x54/0x130 [ 296.572436][T11275] ? handle_mm_fault+0x5da/0x7e0 [ 296.582974][T11275] ? do_user_addr_fault+0x483/0x1210 [ 296.594182][T11275] ? exc_page_fault+0x9e/0x180 [ 296.604850][T11275] ? asm_exc_page_fault+0x1e/0x30 [ 296.615645][T11275] ? copy_user_enhanced_fast_string+0xe/0x40 [ 296.629184][T11275] ? copyin.part.0+0xe4/0x110 [ 296.633911][T11275] ? _copy_from_iter_full+0x22c/0x850 [ 296.650253][T11275] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 296.661929][T11275] ? __phys_addr_symbol+0x2c/0x70 [ 296.672676][T11275] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 296.683927][T11275] ? __check_object_size+0x171/0x3f0 [ 296.694583][T11275] ? skb_do_copy_data_nocache+0x145/0x2c0 [ 296.705832][T11275] ? tcp_poll+0xf40/0xf40 [ 296.715554][T11275] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 296.738735][T11275] ? tcp_sendmsg_locked+0x1360/0x2e40 [ 296.744293][T11275] ? tcp_remove_empty_skb+0x8a0/0x8a0 [ 296.759892][T11275] ? __local_bh_enable_ip+0xa8/0x110 [ 296.765237][T11275] ? tcp_sendmsg+0x2b/0x40 [ 296.775643][T11275] ? inet_sendmsg+0x99/0xe0 [ 296.785580][T11275] ? inet_send_prepare+0x4d0/0x4d0 [ 296.796249][T11275] ? sock_sendmsg+0xcf/0x120 [ 296.800895][T11275] ? __sys_sendto+0x21c/0x320 [ 296.805606][T11275] ? __ia32_sys_getpeername+0xb0/0xb0 [ 296.826420][T11275] ? lock_release+0x3bb/0x710 [ 296.832435][T11275] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 296.849982][T11275] ? clockevents_program_event+0x12b/0x370 [ 296.855847][T11275] ? tick_program_event+0xb4/0x140 [ 296.871311][T11275] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 296.886333][T11275] ? hrtimer_interrupt+0x6f4/0x940 [ 296.891522][T11275] ? kvm_sched_clock_read+0x14/0x40 [ 296.906242][T11275] ? sched_clock+0x2a/0x40 [ 296.910728][T11275] ? __x64_sys_sendto+0xdd/0x1b0 [ 296.915691][T11275] ? lockdep_hardirqs_on+0x79/0x100 [ 296.932756][T11275] ? syscall_enter_from_user_mode+0x1d/0x50 [ 296.942921][T11275] ? do_syscall_64+0x2d/0x70 [ 296.954327][T11275] ? entry_SYSCALL_64_after_hwframe+0x44/0xae