l, 0x800000, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r3}}, 0x10) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000140)) 19:36:48 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0), 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x0, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0x0, 0x101, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8001}) ioctl(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{}, {}]}) membarrier(0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:48 executing program 5: r0 = semget(0x1, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:36:48 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000080)) 19:36:48 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x280000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000001c0)=""/80) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000180)={0x1, 0x1, [@remote]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) write$capi20(r2, &(0x7f00000000c0)={0x10, 0x8001, 0x82, 0x83, 0x3, 0x5}, 0x10) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) [ 387.284174] IPVS: ftp: loaded support on port[0] = 21 19:36:48 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0)={0x3ff}, 0x4) 19:36:48 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)={0x0, 0x100020000, 0x6001, 0x8000000000000}) socket$alg(0x26, 0x5, 0x0) 19:36:48 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0), 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x0, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0x0, 0x101, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8001}) ioctl(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{}, {}]}) membarrier(0x0, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:48 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair(0x8, 0x80000, 0x12f, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) [ 387.682103] net_ratelimit: 24 callbacks suppressed [ 387.682111] protocol 88fb is buggy, dev hsr_slave_0 [ 387.682668] protocol 88fb is buggy, dev hsr_slave_0 [ 387.687112] protocol 88fb is buggy, dev hsr_slave_1 [ 387.692759] protocol 88fb is buggy, dev hsr_slave_1 [ 387.697216] protocol 88fb is buggy, dev hsr_slave_0 [ 387.712360] protocol 88fb is buggy, dev hsr_slave_1 [ 387.717496] protocol 88fb is buggy, dev hsr_slave_0 [ 387.722614] protocol 88fb is buggy, dev hsr_slave_1 [ 388.002058] protocol 88fb is buggy, dev hsr_slave_0 [ 388.007192] protocol 88fb is buggy, dev hsr_slave_1 [ 388.119184] IPVS: ftp: loaded support on port[0] = 21 19:36:49 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x62, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:36:49 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x100000001, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000080)={0x10001, 0x5, 0x7fffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f00000000c0)={0x3ad, 0x8, 0x800, 0x1ff}, 0x10) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) shmget(0x3, 0x4000, 0x20, &(0x7f0000139000/0x4000)=nil) 19:36:49 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x4) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x8000, 0x1000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) 19:36:49 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0), 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x0, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0x0, 0x101, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8001}) ioctl(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{}, {}]}) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:49 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:36:49 executing program 5: r0 = semget(0x1, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:36:49 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x12) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x1, 0x0, "4069f2c5770cf77fe4a1975c9880c53052f53974bd3cc79b2488f4da65053a2ae57f1aa15bb75dcd34cd7b5f1506754143f22ea09c67474c316dcf70ce673f5c1005eed27a6d77317e4a571eebea7cad"}, 0xd8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) [ 388.278340] IPVS: ftp: loaded support on port[0] = 21 19:36:49 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x600) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x80, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000280)={0x3, 0x100, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r3, 0x40000000af01, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000001c0)={'hwsim0\x00', 0x6}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f00000019c0)=""/246, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000000)={0x200000000001, r4}) ioctl$VHOST_SET_VRING_BASE(r3, 0x4028af11, &(0x7f0000000100)={0x1}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0xdb, 0x3f9, "259ec2cdaa8aa41b9e92dc0b3fd2ec632d9d5aa52ef7021c30c582e21069224bdaee606a96d410fd4334d92e36dc208e0a91fa76905cb0730eb1c8fae7a9ab74ec20bfcb88351b7efd34e2b4230867a34a4abd4c551dbda3259d0175efaa20c33cbce32d38ec2e87e740334e09d139bdbdb02e3ddded335aa80c71fc30f1865c57bd61be426d8c80434fad7d747afb7ba190194f2ddaa59316a4cfd998deb7af4d48e7b5f1eb6f73cf080cebef823bc216fa2154237cae1b8543817a8a7dce39cca89b9b9329399e786d6157025d9b0f29e7d2"}, &(0x7f00000000c0), 0x1000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) 19:36:49 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x4}) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7, 0x0) 19:36:49 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_settime(0x2, &(0x7f0000000140)={r2, r3+30000000}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) 19:36:49 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0), 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x0, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0x0, 0x101, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8001}) ioctl(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:49 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0xa0040, 0x0) dup(r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400204) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x3, 0x0) clock_gettime(0x7, &(0x7f0000000280)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000140)={0x6, 0xfffffffffffff5f4, 0xf7fffffffffffffb, {r5, r6+30000000}, 0x6, 0x4efeb5c3}) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) [ 388.919994] IPVS: ftp: loaded support on port[0] = 21 19:36:49 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x64, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:36:49 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x280000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffffc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0x0, 0x9f6, 0x8001, [], &(0x7f00000000c0)={0xa00902, 0xfffffffffffffffb, [], @p_u8=&(0x7f0000000080)=0x357}}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) 19:36:49 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) munlock(&(0x7f0000689000/0x4000)=nil, 0x4000) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7f, 0x80002) getsockopt(r1, 0xb60, 0x8, &(0x7f0000000140)=""/151, &(0x7f00000000c0)=0x97) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) 19:36:49 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x101, 0x40a80) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f00000000c0)) 19:36:49 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0), 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x0, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0x0, 0x101, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8001}) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:49 executing program 5: semget(0x1, 0x4, 0x32) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 389.066352] IPVS: ftp: loaded support on port[0] = 21 19:36:50 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) r2 = open(&(0x7f0000000080)='./file0\x00', 0x800, 0x2) write$uinput_user_dev(r2, &(0x7f0000000140)={'syz1\x00', {0x20, 0x81, 0x40, 0x4f6}, 0x3, [0x7, 0x2, 0x100000001, 0x6fb, 0x6, 0xe00, 0x52, 0x6, 0x1, 0x100000000, 0x100, 0x20, 0x7, 0x0, 0x7, 0x5, 0x7, 0x2a86, 0xffffffff80000001, 0x0, 0x3, 0x3, 0x1, 0x6, 0x0, 0x9, 0x9, 0x80000000, 0x3f, 0x7, 0x9, 0x1ff, 0x10001, 0x4, 0xbd3, 0x7, 0x3f, 0x80, 0x1, 0xfffffffffffffff9, 0x10000, 0x4, 0x7f, 0x3, 0x200, 0x4, 0x7, 0x101, 0x6, 0x9, 0x9, 0x0, 0x61238c8e, 0x63, 0x0, 0x8, 0x7, 0xfff, 0x3, 0x5, 0x101, 0x1, 0x1ff, 0x3ff], [0xfff, 0x1, 0x0, 0x9, 0x7, 0x2, 0x911, 0x2000000000, 0xffffffffffffffe1, 0x5, 0xfffffffffffffffe, 0x8235, 0x3ff, 0xe2cf, 0x2, 0xba, 0xf998, 0xfb, 0x2, 0xffffffffffffff80, 0x2, 0xff, 0x2, 0x1800, 0xffffffffffffff4e, 0xfffffffffffff597, 0x100000001, 0x6, 0x2, 0x8, 0x3827a8ad, 0x6, 0x3, 0x3, 0x5, 0x8, 0x60, 0x3799, 0x3, 0x0, 0x0, 0x7, 0x7, 0x100000001, 0x1d6, 0x9, 0x1ff, 0x0, 0x0, 0x4, 0x8, 0x6, 0x8001, 0x10001, 0x6, 0x818, 0xc5, 0x7fff, 0xffff, 0x10001, 0x8, 0x0, 0x4, 0xffff], [0x44b, 0x100000000, 0x1000000000, 0x100000000, 0x6, 0x101, 0x800, 0x30dd, 0x43f69f96, 0x1, 0x7, 0xffffffff, 0x4, 0x5, 0x1, 0x8, 0x3ff, 0x6, 0x9, 0x1, 0x4, 0x2, 0xf5, 0x200, 0xdc1d, 0x6, 0x3, 0x7, 0x9c, 0x4c, 0x7fff, 0x8, 0x2, 0x0, 0x5, 0xc0, 0x2, 0x3, 0x8000, 0xffffffff, 0x6, 0xffffffffffffffff, 0xdcf6000, 0x8, 0x1, 0x9, 0x1, 0x7276, 0x0, 0x0, 0x100000001, 0x100, 0x0, 0x100, 0x86, 0x4, 0x7, 0x2, 0x9, 0x9, 0x8, 0x764e, 0xfffffffffffffffd, 0x7ff], [0x0, 0x1b9a, 0x8, 0x80000000, 0x3, 0x7, 0x8, 0x80000001, 0x2, 0x1, 0x0, 0xc2, 0x1, 0x3, 0x100000001, 0x8001, 0x0, 0xa6e8, 0xffff, 0xb61, 0x1, 0x2d, 0x2, 0x223e, 0x9, 0x8f, 0x4, 0x80000000, 0x7fff, 0x800, 0x7fffffff, 0x4, 0xffffffffffff0000, 0x6, 0x74e, 0x434, 0x1, 0x800, 0x8001, 0x7, 0x5d4, 0x8, 0x8, 0x4, 0x9, 0x5, 0x6, 0x8, 0x7, 0x3ff, 0x8, 0x2, 0x2, 0xa6, 0xff, 0x80000000, 0x4, 0x217, 0x2, 0x10000, 0x8000, 0xdee, 0x8fe, 0x4]}, 0x45c) 19:36:50 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0x4, 0x301f}) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000000c0)=0x1) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video37\x00', 0x2, 0x0) mprotect(&(0x7f000020a000/0x1000)=nil, 0x1000, 0x4) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000180)=""/146, &(0x7f0000000240)=0x92) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) [ 389.137580] IPVS: ftp: loaded support on port[0] = 21 19:36:50 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) accept4(r1, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000140)=0x80, 0x80000) getsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xfffffffffffffffc) keyctl$revoke(0x3, r3) 19:36:50 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0), 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:50 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000140)={0x0, @reserved}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) 19:36:50 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x800, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000000c0), &(0x7f0000000140)=0x4) [ 389.918944] IPVS: ftp: loaded support on port[0] = 21 19:36:52 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x88, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:36:52 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10200, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f00000000c0)=0x39ce) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:36:52 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:52 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='veth1_to_team\x00', 0x10) recvfrom$unix(r1, &(0x7f00000000c0), 0x0, 0x40000102, 0x0, 0x0) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000140)) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) 19:36:52 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x20, 0x1, 0x0, 0x0, {0x1}, [@nested={0xc, 0x1, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) mprotect(&(0x7f00006a1000/0x2000)=nil, 0x2000, 0x3) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) 19:36:52 executing program 5: semget(0x1, 0x4, 0x32) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 391.796647] IPVS: ftp: loaded support on port[0] = 21 [ 391.814821] IPVS: ftp: loaded support on port[0] = 21 19:36:52 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x20c080, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000180)={r3, 0x7}, &(0x7f00000001c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000200)) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) [ 391.849533] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 19:36:52 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x10001, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x103) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sendfile(r2, r0, &(0x7f00000000c0), 0x8) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) setsockopt$inet6_int(r1, 0x29, 0x48, &(0x7f00000001c0)=0x63, 0x4) 19:36:52 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:53 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x880, 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @local}, 0x0, 0x0, 0x2}}, 0x2e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:36:53 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4101, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$input_event(r2, &(0x7f0000000140)={{r3, r4/1000+30000}, 0x2, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) 19:36:53 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 392.454546] IPVS: ftp: loaded support on port[0] = 21 [ 393.922036] net_ratelimit: 25 callbacks suppressed [ 393.922044] protocol 88fb is buggy, dev hsr_slave_0 [ 393.922057] protocol 88fb is buggy, dev hsr_slave_0 [ 393.927063] protocol 88fb is buggy, dev hsr_slave_1 [ 393.932098] protocol 88fb is buggy, dev hsr_slave_1 [ 393.937121] protocol 88fb is buggy, dev hsr_slave_0 [ 393.952157] protocol 88fb is buggy, dev hsr_slave_1 [ 393.957266] protocol 88fb is buggy, dev hsr_slave_0 [ 393.962356] protocol 88fb is buggy, dev hsr_slave_1 [ 394.242090] protocol 88fb is buggy, dev hsr_slave_0 [ 394.247221] protocol 88fb is buggy, dev hsr_slave_1 19:36:55 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x98, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:36:55 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:36:55 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x1a000, 0x0) write$FUSE_INIT(r4, &(0x7f0000000140)={0x50, 0x0, 0x3, {0x7, 0x1c, 0x9, 0x400, 0x80000000, 0x6, 0x4, 0x4}}, 0x50) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205649, &(0x7f0000000040)) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000080)={'veth1_to_hsr\x00', 0xc9b1}) 19:36:55 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:55 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205647, &(0x7f0000000040)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r3, r4) 19:36:55 executing program 5: semget(0x1, 0x4, 0x32) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:36:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2}, 0x2f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0x8, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000200000000000000040000007b07feffffffffff8500000019000000950000000000000095000000000000009a4a4d77096e104400e3dd75ad25f15cc5629c"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xb}, 0x48) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000280)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0xca) [ 394.665956] IPVS: ftp: loaded support on port[0] = 21 19:36:55 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x28040) epoll_wait(r2, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x6, 0x3) 19:36:55 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:55 executing program 1: [ 394.758537] IPVS: ftp: loaded support on port[0] = 21 19:36:55 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x4}) 19:36:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r2, r0) r3 = accept$inet6(r0, 0x0, 0x0) sendto(r3, 0x0, 0x0, 0x0, 0x0, 0x0) [ 395.505860] IPVS: ftp: loaded support on port[0] = 21 19:36:56 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xa6, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:36:56 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:56 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000140)={0x0, 0x2e76, 0x800, [], &(0x7f00000000c0)=0xcf09}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000080)={0xb, 0x101, 0x1, {0x5ebd, 0x9, 0x3ff, 0x6}}) 19:36:56 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000c34000/0x1000)=nil}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) mlock2(&(0x7f0000a19000/0x2000)=nil, 0x2000, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x1000000000000084) 19:36:56 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:36:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2}, 0x2f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0x8, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000200000000000000040000007b07feffffffffff8500000019000000950000000000000095000000000000009a4a4d77096e104400e3dd75ad25f15cc5629c"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xb}, 0x48) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000280)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0xca) 19:36:56 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000080)={0x0, "48cdce4db6daba959b00094e4b35329e184397ed7529e20045a32a81509b3a44", 0x941, 0x7, 0x2, 0x10, 0x5}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) [ 395.894155] IPVS: ftp: loaded support on port[0] = 21 [ 395.958122] IPVS: ftp: loaded support on port[0] = 21 19:36:56 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:56 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0xffffffffffffffff, 0x101000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3f, 0x533a60a59506da3f) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xffffffffffffffff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) socket$can_bcm(0x1d, 0x2, 0x2) connect$rose(r1, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @bcast}, 0x1c) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:36:57 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(tnepres-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000680)=""/120, 0x200006f8}, {&(0x7f0000000400)=""/230, 0xe6}], 0x2}}], 0x1, 0x0, 0x0) 19:36:57 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:57 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x130, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:36:57 executing program 0: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:36:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2}, 0x2f) socket$kcm(0xa, 0x0, 0x88) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0xca) 19:36:57 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:36:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:58 executing program 1: 19:36:58 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:36:59 executing program 1: 19:36:59 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:59 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:36:59 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000280)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:36:59 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1c8, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:36:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:36:59 executing program 1: [ 398.768159] IPVS: ftp: loaded support on port[0] = 21 [ 398.777205] IPVS: ftp: loaded support on port[0] = 21 19:36:59 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r3, 0x401}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}) 19:36:59 executing program 1: 19:36:59 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:36:59 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xffff, 0x10102) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x104, r4, 0x402, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffe1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffd6bf}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf37}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3bd1000}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x128}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x10}, 0x8000) accept4$unix(r1, 0x0, &(0x7f0000000040), 0x80000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000080)={0x0, 0xac}) 19:36:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:00 executing program 1: 19:37:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 399.194497] cgroup: fork rejected by pids controller in /syz4 [ 399.560285] IPVS: ftp: loaded support on port[0] = 21 19:37:00 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:00 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0x80) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000180)=0x9, 0xffffffffffffffb1) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x30, r3, 0x300, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x4, 0x100, 0x8}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0205648, &(0x7f0000000040)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x200000, 0x0) [ 399.680101] IPVS: ftp: loaded support on port[0] = 21 [ 400.162071] net_ratelimit: 26 callbacks suppressed [ 400.162077] protocol 88fb is buggy, dev hsr_slave_0 [ 400.172071] protocol 88fb is buggy, dev hsr_slave_0 [ 400.172120] protocol 88fb is buggy, dev hsr_slave_1 [ 400.177146] protocol 88fb is buggy, dev hsr_slave_1 [ 400.187231] protocol 88fb is buggy, dev hsr_slave_0 [ 400.192620] protocol 88fb is buggy, dev hsr_slave_1 [ 400.197709] protocol 88fb is buggy, dev hsr_slave_0 [ 400.202805] protocol 88fb is buggy, dev hsr_slave_1 [ 400.482158] protocol 88fb is buggy, dev hsr_slave_0 [ 400.487265] protocol 88fb is buggy, dev hsr_slave_1 19:37:02 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1dc, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:02 executing program 1: 19:37:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:02 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x101, 0x400002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000080)={0x0, 0x0, 0x3015, 0x400000000000000}) 19:37:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 19:37:02 executing program 5: r0 = semget(0xffffffffffffffff, 0x0, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 401.557625] IPVS: ftp: loaded support on port[0] = 21 19:37:02 executing program 1: [ 401.593994] IPVS: ftp: loaded support on port[0] = 21 19:37:02 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000800)='1\f\xfe8v\xb5\'\x1c\xd2\x9cx6\x92nF\xb4\xadz\x9dvo\xf7\xa2\x81t\xab\xae\"\xb9\xbd\x9f\xe6<\xa4\xf7\xd7\xe1\xe1H\xfc\x011G', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="22410370caabf21154d3242b779a587fe7aa957658c90c3a26d254030d028a2d6c114d6afed5fcb8a631f6b39de0908a9d73361604f724d45a50c62349c55e383be94de30f311675986d32bc87bfae69b9fb62cf564918898dc45891f64ed6c70eeaf9d924f15afd083c39e78cb5b28467d0327a8f2db1", 0x77, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f0000000440)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', '}'}, 0x19, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mprotect(&(0x7f00003b2000/0x2000)=nil, 0x2000, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000740)={0x4, 0x0, 'client1\x00', 0x5, "b16eba7d38255aba", "ad10618bb1ea714b2ca2fa20dc5acede1d94b44e07aa17599a749965f584db60", 0x0, 0x7fd}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x80, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @dev}, &(0x7f0000000700)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000880)={0x0, 0x7, 0x8, 0xd8, 0x3, 0x7f, 0x475, 0x1, {0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x0, 0x7, 0xac, 0xff}}, &(0x7f0000000940)=0xb0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000980)={r5, 0x7}, 0x8) r6 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0xf36d, 0x400) getsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000340), &(0x7f0000000840)=0x8) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x3, 0x1ff, 0x6, 0x100000001, 0x3, [{0x6, 0x1f, 0x2e970cf8, 0x0, 0x0, 0x300}, {0x0, 0x3, 0x9, 0x0, 0x0, 0x2000}, {0x97f, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xb00}]}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8004}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x30, r7, 0xc, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffff81}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x4001) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x91a4}, &(0x7f00000001c0)=0x8) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000640)={0x1, 0x0, [{0xbfd, 0x0, 0x1ff}]}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000200)={r8, 0xffff, 0x800000000000007b, [0x8, 0x3]}, 0xc) 19:37:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:02 executing program 1: 19:37:02 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x18440) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fdatasync(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:37:02 executing program 1: [ 402.376182] IPVS: ftp: loaded support on port[0] = 21 19:37:03 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x260, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:03 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x41, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0205648, &(0x7f0000000040)) 19:37:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 19:37:03 executing program 1: 19:37:03 executing program 5: r0 = semget(0xffffffffffffffff, 0x0, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:03 executing program 1: [ 402.731426] IPVS: ftp: loaded support on port[0] = 21 [ 402.739652] IPVS: ftp: loaded support on port[0] = 21 19:37:03 executing program 2: 19:37:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:03 executing program 1: 19:37:03 executing program 2: 19:37:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 403.484216] IPVS: ftp: loaded support on port[0] = 21 19:37:04 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x282, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:04 executing program 1: 19:37:04 executing program 2: 19:37:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:04 executing program 5: r0 = semget(0xffffffffffffffff, 0x0, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:04 executing program 1: 19:37:04 executing program 2: [ 403.761017] IPVS: ftp: loaded support on port[0] = 21 [ 403.786880] IPVS: ftp: loaded support on port[0] = 21 19:37:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:04 executing program 2: 19:37:04 executing program 1: 19:37:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 404.383744] IPVS: ftp: loaded support on port[0] = 21 19:37:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x300, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:05 executing program 1: 19:37:05 executing program 2: 19:37:05 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:05 executing program 2: 19:37:05 executing program 1: [ 404.613098] IPVS: ftp: loaded support on port[0] = 21 19:37:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 404.706673] IPVS: ftp: loaded support on port[0] = 21 19:37:05 executing program 1: 19:37:05 executing program 2: 19:37:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 405.357984] IPVS: ftp: loaded support on port[0] = 21 19:37:06 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x500, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:06 executing program 2: 19:37:06 executing program 1: 19:37:06 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:06 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 405.663910] IPVS: ftp: loaded support on port[0] = 21 19:37:06 executing program 2: 19:37:06 executing program 1: [ 405.697305] IPVS: ftp: loaded support on port[0] = 21 19:37:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:06 executing program 2: 19:37:06 executing program 1: 19:37:06 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 406.372168] IPVS: ftp: loaded support on port[0] = 21 [ 406.402046] net_ratelimit: 25 callbacks suppressed [ 406.402055] protocol 88fb is buggy, dev hsr_slave_0 [ 406.402059] protocol 88fb is buggy, dev hsr_slave_0 [ 406.402109] protocol 88fb is buggy, dev hsr_slave_1 [ 406.407104] protocol 88fb is buggy, dev hsr_slave_1 [ 406.412162] protocol 88fb is buggy, dev hsr_slave_0 [ 406.432271] protocol 88fb is buggy, dev hsr_slave_1 [ 406.437397] protocol 88fb is buggy, dev hsr_slave_0 [ 406.442500] protocol 88fb is buggy, dev hsr_slave_1 19:37:07 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1100, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:07 executing program 2: 19:37:07 executing program 1: 19:37:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040), &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:07 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) lstat(0x0, &(0x7f0000000240)) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:07 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 406.601326] IPVS: ftp: loaded support on port[0] = 21 19:37:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}, 0xffffffff}], 0x361, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/packet\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x2, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) 19:37:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100001079004d90781efd1cb54ad58a281db1c73936c77aa3f7fac33b042bd368236862531934ecd4c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed014960aa48810d0967a916928c031bc9976d8"], 0x0) [ 406.715718] IPVS: ftp: loaded support on port[0] = 21 [ 406.722064] protocol 88fb is buggy, dev hsr_slave_0 [ 406.727196] protocol 88fb is buggy, dev hsr_slave_1 19:37:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040), &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) getpid() setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x23f42362, 0x4) recvmmsg(r0, &(0x7f0000001cc0), 0x4000052, 0x10102, &(0x7f0000001540)={0x0, r1+10000000}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 19:37:07 executing program 1: r0 = socket$inet6(0x18, 0x10000001, 0x0) shutdown(r0, 0x2) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, 0x0, 0x0) 19:37:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 407.553013] IPVS: ftp: loaded support on port[0] = 21 19:37:08 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1d00, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040), &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) sendmsg$netlink(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000001840)=[{}], 0x1}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) listen(r1, 0x7f) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 19:37:08 executing program 5: semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 407.941317] IPVS: ftp: loaded support on port[0] = 21 [ 407.964143] IPVS: ftp: loaded support on port[0] = 21 19:37:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:09 executing program 2: syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) sendmsg$netlink(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000001840)=[{}], 0x1}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) listen(r1, 0x7f) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 19:37:09 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x3, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 409.139768] IPVS: ftp: loaded support on port[0] = 21 [ 409.179715] IPVS: ftp: loaded support on port[0] = 21 19:37:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 412.453992] IPVS: ftp: loaded support on port[0] = 21 [ 412.642033] net_ratelimit: 26 callbacks suppressed [ 412.642041] protocol 88fb is buggy, dev hsr_slave_0 [ 412.642061] protocol 88fb is buggy, dev hsr_slave_0 [ 412.647056] protocol 88fb is buggy, dev hsr_slave_1 [ 412.652109] protocol 88fb is buggy, dev hsr_slave_1 [ 412.657145] protocol 88fb is buggy, dev hsr_slave_0 [ 412.672222] protocol 88fb is buggy, dev hsr_slave_1 [ 412.677346] protocol 88fb is buggy, dev hsr_slave_0 [ 412.682471] protocol 88fb is buggy, dev hsr_slave_1 [ 412.747411] chnl_net:caif_netlink_parms(): no params data found [ 412.838156] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.862088] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.892189] device bridge_slave_0 entered promiscuous mode [ 412.901095] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.926883] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.952898] device bridge_slave_1 entered promiscuous mode [ 412.962049] protocol 88fb is buggy, dev hsr_slave_0 [ 412.967131] protocol 88fb is buggy, dev hsr_slave_1 [ 413.001421] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 413.023750] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 413.053558] team0: Port device team_slave_0 added [ 413.059663] team0: Port device team_slave_1 added [ 413.205422] device hsr_slave_0 entered promiscuous mode [ 413.290148] device hsr_slave_1 entered promiscuous mode [ 413.341395] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.347906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.354531] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.360869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.499910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 413.544077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 413.592318] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.622155] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.682727] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 413.734959] 8021q: adding VLAN 0 to HW filter on device team0 [ 413.765093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 413.783509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 413.791188] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.797593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.840268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 413.851241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 413.889904] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.896349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.917632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 413.933118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 413.958561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 413.990356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 413.998368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 414.018759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 414.032730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 414.040368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.086074] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 414.112921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 414.150714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 414.162698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 414.170708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.221351] 8021q: adding VLAN 0 to HW filter on device batadv0 19:37:15 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:15 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x3001, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) 19:37:15 executing program 1 (fault-call:4 fault-nth:0): unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:15 executing program 5: semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:15 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:15 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) socketpair$unix(0x1, 0x100000000000000, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [], r1}, 0x18, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 415.131703] IPVS: ftp: loaded support on port[0] = 21 19:37:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 415.153594] IPVS: ftp: loaded support on port[0] = 21 [ 415.197645] IPVS: ftp: loaded support on port[0] = 21 19:37:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) 19:37:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:16 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', r0, 0x0, 0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast1, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)) fstat(0xffffffffffffffff, &(0x7f0000000780)) getresuid(&(0x7f0000000380), &(0x7f0000000800), &(0x7f0000000840)=0x0) ioprio_get$uid(0x3, r1) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) chown(0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000880)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e21,sq=0x0000000000000000,rq=0x0000000000000000,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b6673726f6f743d2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c35c4b7769cbd955a6568641006d7c0206b74e3332653002c66736d616769633d3078303030303030303030303030303030302c646566636f6e746578743d73797374656d5f752c00a45fb6"]) io_cancel(0x0, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:37:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 415.892891] FAULT_INJECTION: forcing a failure. [ 415.892891] name failslab, interval 1, probability 0, space 0, times 0 [ 415.909160] IPVS: ftp: loaded support on port[0] = 21 [ 415.932174] CPU: 0 PID: 18224 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 415.939493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.948863] Call Trace: [ 415.951477] dump_stack+0x172/0x1f0 [ 415.955121] should_fail.cold+0xa/0x1b [ 415.959023] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.964144] ? lock_downgrade+0x810/0x810 [ 415.968306] ? ___might_sleep+0x163/0x280 [ 415.968328] __should_failslab+0x121/0x190 [ 415.976691] should_failslab+0x9/0x14 [ 415.980483] __kmalloc+0x2dc/0x740 [ 415.984038] ? kasan_check_write+0x14/0x20 [ 415.988281] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 415.993129] ? ipt_alloc_initial_table+0x6b/0x660 [ 415.997983] ipt_alloc_initial_table+0x6b/0x660 [ 415.998006] iptable_raw_table_init+0x8e/0xe0 [ 416.007149] xt_find_table_lock+0x299/0x430 [ 416.007176] xt_request_find_table_lock+0x2c/0xe0 [ 416.007192] get_info+0x152/0x570 [ 416.019791] ? translate_compat_table+0x1820/0x1820 [ 416.025276] ? debug_smp_processor_id+0x1c/0x20 [ 416.025290] ? perf_trace_lock+0xeb/0x510 [ 416.025307] ? zap_class+0x460/0x460 [ 416.034090] ? lock_acquire+0x16f/0x3f0 [ 416.034106] ? nf_sockopt_find.constprop.0+0x2d/0x290 [ 416.034121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.034138] ? cap_capable+0x205/0x270 [ 416.052500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.061886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.067415] ? ns_capable_common+0x141/0x170 [ 416.067437] do_ipt_get_ctl+0x177/0x930 [ 416.067451] ? zap_class+0x460/0x460 [ 416.075904] ? cache_grow_begin.cold+0x2e/0x31 [ 416.084172] ? get_info+0x570/0x570 [ 416.087793] ? find_held_lock+0x35/0x130 [ 416.087811] ? wait_for_completion+0x440/0x440 [ 416.087844] ? mutex_unlock+0xd/0x10 [ 416.096447] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 416.105846] nf_getsockopt+0x80/0xe0 [ 416.105867] ip_getsockopt+0x176/0x1d0 [ 416.113435] ? do_ip_getsockopt+0x1830/0x1830 [ 416.113455] ? kasan_check_write+0x14/0x20 [ 416.113480] udp_getsockopt+0x68/0xa0 [ 416.122193] sock_common_getsockopt+0x9a/0xe0 [ 416.122214] __sys_getsockopt+0x168/0x250 [ 416.122230] ? kernel_setsockopt+0x1e0/0x1e0 [ 416.130499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 416.130511] ? do_syscall_64+0x26/0x610 [ 416.130528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.139043] ? do_syscall_64+0x26/0x610 [ 416.139063] __x64_sys_getsockopt+0xbe/0x150 [ 416.139081] do_syscall_64+0x103/0x610 [ 416.147782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.147793] RIP: 0033:0x457e29 [ 416.147808] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.157100] RSP: 002b:00007f714de81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 416.157115] RAX: ffffffffffffffda RBX: 00007f714de81c90 RCX: 0000000000457e29 [ 416.157123] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 416.157133] RBP: 000000000073bf00 R08: 0000000020000080 R09: 0000000000000000 [ 416.165477] R10: 0000000020000000 R11: 0000000000000246 R12: 00007f714de826d4 [ 416.165487] R13: 00000000004be985 R14: 00000000004cf780 R15: 0000000000000004 19:37:17 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x4000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:17 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) bind$unix(r0, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x1e) sendmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x232, &(0x7f0000003140), 0x0, 0x0, 0xffffffffffffff5b}}, {{&(0x7f00000072c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x1, 0x4, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0x17}, 0x4}}}, 0xff80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 416.350884] IPVS: ftp: loaded support on port[0] = 21 19:37:17 executing program 1 (fault-call:4 fault-nth:1): unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:17 executing program 5: semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:17 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x1, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x8, @bearer=@udp='udp:syz1\x00'}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 19:37:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 416.446741] IPVS: ftp: loaded support on port[0] = 21 [ 416.533472] IPVS: ftp: loaded support on port[0] = 21 19:37:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 417.273668] IPVS: ftp: loaded support on port[0] = 21 [ 417.403909] FAULT_INJECTION: forcing a failure. [ 417.403909] name failslab, interval 1, probability 0, space 0, times 0 [ 417.455809] CPU: 0 PID: 18286 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 417.463131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.472609] Call Trace: [ 417.475224] dump_stack+0x172/0x1f0 [ 417.478871] should_fail.cold+0xa/0x1b [ 417.482782] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 417.487903] ? lock_downgrade+0x810/0x810 [ 417.492072] ? ___might_sleep+0x163/0x280 [ 417.496236] __should_failslab+0x121/0x190 [ 417.500484] should_failslab+0x9/0x14 [ 417.504292] kmem_cache_alloc_node_trace+0x270/0x720 [ 417.509399] ? find_held_lock+0x35/0x130 [ 417.513529] ? fs_reclaim_acquire+0x20/0x20 [ 417.517859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.523409] __kmalloc_node+0x3d/0x70 [ 417.527273] kvmalloc_node+0x68/0x100 [ 417.531094] xt_alloc_table_info+0x41/0xa0 [ 417.535338] ipt_register_table+0xc2/0x310 [ 417.539585] ? translate_table+0x17d0/0x17d0 [ 417.544018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.549576] ? ipt_alloc_initial_table+0x55e/0x660 [ 417.554524] iptable_raw_table_init+0xb3/0xe0 [ 417.559037] xt_find_table_lock+0x299/0x430 [ 417.563381] xt_request_find_table_lock+0x2c/0xe0 [ 417.568231] get_info+0x152/0x570 [ 417.571696] ? translate_compat_table+0x1820/0x1820 [ 417.576737] ? debug_smp_processor_id+0x1c/0x20 [ 417.581413] ? perf_trace_lock+0xeb/0x510 [ 417.585570] ? zap_class+0x460/0x460 [ 417.589287] ? lock_acquire+0x16f/0x3f0 [ 417.593269] ? nf_sockopt_find.constprop.0+0x2d/0x290 [ 417.598468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.604011] ? cap_capable+0x205/0x270 [ 417.607916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.613464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.619006] ? ns_capable_common+0x141/0x170 [ 417.623425] do_ipt_get_ctl+0x177/0x930 [ 417.627402] ? zap_class+0x460/0x460 [ 417.631131] ? cache_grow_begin.cold+0x2e/0x31 [ 417.635730] ? get_info+0x570/0x570 [ 417.639356] ? find_held_lock+0x35/0x130 [ 417.643425] ? wait_for_completion+0x440/0x440 [ 417.648026] ? mutex_unlock+0xd/0x10 [ 417.651758] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 417.657154] nf_getsockopt+0x80/0xe0 [ 417.660882] ip_getsockopt+0x176/0x1d0 [ 417.664780] ? do_ip_getsockopt+0x1830/0x1830 [ 417.669288] ? kasan_check_write+0x14/0x20 [ 417.673534] udp_getsockopt+0x68/0xa0 [ 417.677349] sock_common_getsockopt+0x9a/0xe0 [ 417.681851] __sys_getsockopt+0x168/0x250 [ 417.685999] ? kernel_setsockopt+0x1e0/0x1e0 [ 417.686020] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.686033] ? do_syscall_64+0x26/0x610 [ 417.686054] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.704510] ? do_syscall_64+0x26/0x610 [ 417.708501] __x64_sys_getsockopt+0xbe/0x150 [ 417.712923] do_syscall_64+0x103/0x610 [ 417.716821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.722016] RIP: 0033:0x457e29 [ 417.725220] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.744123] RSP: 002b:00007f714de81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 19:37:18 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:18 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x6002, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 417.744138] RAX: ffffffffffffffda RBX: 00007f714de81c90 RCX: 0000000000457e29 [ 417.744146] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 417.744154] RBP: 000000000073bf00 R08: 0000000020000080 R09: 0000000000000000 [ 417.744162] R10: 0000000020000000 R11: 0000000000000246 R12: 00007f714de826d4 [ 417.744173] R13: 00000000004be985 R14: 00000000004cf780 R15: 0000000000000004 [ 417.818629] IPVS: ftp: loaded support on port[0] = 21 [ 417.848058] IPVS: ftp: loaded support on port[0] = 21 [ 418.187786] IPVS: ftp: loaded support on port[0] = 21 19:37:19 executing program 1 (fault-call:4 fault-nth:2): unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:19 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:19 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:19 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x6200, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 418.484949] IPVS: ftp: loaded support on port[0] = 21 [ 418.501811] IPVS: ftp: loaded support on port[0] = 21 19:37:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr(r0, 0x0, &(0x7f0000000700)='gre0\x00', 0x5, 0x0) ptrace$poke(0x4, 0x0, &(0x7f0000000340), 0xde) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x8}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0x8) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value, &(0x7f0000000480)=0x8) connect$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x1, 0x1, 0x5, 0x1, 0x40, "257e653efe6273113db1e8bb68cb83b240030404a31520d2db7616959264411cc3b343caaec26aa8b3926859d822954d439707d1b4dac077cd6e5e228ec442", 0x29}, 0x60) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000004c0)={r1, 0x5c, 0x1, [0x0]}, 0xa) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000ac0)={0x2, &(0x7f0000000a80)=[{0x2, 0x7138, 0x2}, {0x2, 0x3f, 0x3}]}, 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)=0x0) process_vm_readv(r2, &(0x7f0000000bc0)=[{&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f00000005c0)=""/254, 0xfe}, {&(0x7f0000000840)=""/146, 0x92}, {&(0x7f0000000900)=""/246, 0xf6}, {&(0x7f00000002c0)}, {&(0x7f0000000400)=""/28, 0x1c}, {&(0x7f0000000b00)=""/137, 0x89}, {&(0x7f0000000a00)=""/85, 0x55}], 0x9, &(0x7f0000000440), 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={0xe0}, &(0x7f0000000240), 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt(0xffffffffffffffff, 0x0, 0x4, 0x0, &(0x7f0000000300)) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0af51f023c123f3188a070") ioctl$TIOCSSOFTCAR(r3, 0x40046103, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) accept4$inet6(r3, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000440)=0x1c, 0x800) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r6, 0x2, 0x0, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) [ 418.546066] IPVS: ftp: loaded support on port[0] = 21 19:37:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:19 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x11\b\x00\x00\x00\x04\x00', @ifru_settings={0xa07000, 0x0, @raw_hdlc=0x0}}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40204020}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x400, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x50}, 0x0) r3 = fcntl$getown(r1, 0x9) fcntl$setown(r0, 0x8, r3) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000080)="d8fff326e6000f0013baf80c66b8b04a548866efbafc0cb808e9ef66b93709000066b8a500000066ba000000000f300fc7f4d7baf80c66b8cdf0878866efbafc0cec662edba867000f20e06635080000000f22e0", 0x54}], 0x1, 0x5, &(0x7f0000000180)=[@cstype0={0x4, 0x4}], 0x1) 19:37:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 418.722042] net_ratelimit: 36 callbacks suppressed [ 418.722055] protocol 88fb is buggy, dev hsr_slave_0 [ 418.732178] protocol 88fb is buggy, dev hsr_slave_1 19:37:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:19 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'syzkax\xf3B\x9f0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) mkdir(0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f00000001c0)=""/163, 0x0) r0 = semget(0x3, 0x3, 0x295) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) semctl$IPC_RMID(r0, 0x0, 0x0) [ 418.882080] protocol 88fb is buggy, dev hsr_slave_0 [ 418.882093] protocol 88fb is buggy, dev hsr_slave_0 [ 418.887208] protocol 88fb is buggy, dev hsr_slave_1 [ 418.892264] protocol 88fb is buggy, dev hsr_slave_1 [ 418.897309] protocol 88fb is buggy, dev hsr_slave_0 [ 418.907308] protocol 88fb is buggy, dev hsr_slave_1 [ 418.912509] protocol 88fb is buggy, dev hsr_slave_0 [ 418.917572] protocol 88fb is buggy, dev hsr_slave_1 [ 419.407893] IPVS: ftp: loaded support on port[0] = 21 [ 419.420651] FAULT_INJECTION: forcing a failure. [ 419.420651] name failslab, interval 1, probability 0, space 0, times 0 [ 419.469457] CPU: 0 PID: 18347 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #84 [ 419.476866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.486229] Call Trace: [ 419.488834] dump_stack+0x172/0x1f0 [ 419.492473] should_fail.cold+0xa/0x1b [ 419.496371] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 419.501495] ? lock_downgrade+0x810/0x810 [ 419.505662] ? ___might_sleep+0x163/0x280 [ 419.509823] __should_failslab+0x121/0x190 [ 419.514071] should_failslab+0x9/0x14 [ 419.517878] kmem_cache_alloc_node_trace+0x270/0x720 [ 419.523048] ? percpu_ref_put_many+0x94/0x190 [ 419.527559] __kmalloc_node+0x3d/0x70 [ 419.531379] kvmalloc_node+0x68/0x100 [ 419.535189] xt_alloc_entry_offsets+0x3f/0x50 [ 419.539689] translate_table+0x21c/0x17d0 [ 419.543939] ? kasan_unpoison_shadow+0x35/0x50 [ 419.548528] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 419.553641] ? alloc_counters.isra.0+0x680/0x680 [ 419.558405] ? memset+0x32/0x40 [ 419.561696] ipt_register_table+0x11b/0x310 [ 419.566032] ? translate_table+0x17d0/0x17d0 [ 419.570463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.576008] ? ipt_alloc_initial_table+0x55e/0x660 [ 419.580948] iptable_raw_table_init+0xb3/0xe0 [ 419.585460] xt_find_table_lock+0x299/0x430 [ 419.589831] xt_request_find_table_lock+0x2c/0xe0 [ 419.594680] get_info+0x152/0x570 [ 419.598140] ? translate_compat_table+0x1820/0x1820 [ 419.603169] ? debug_smp_processor_id+0x1c/0x20 [ 419.607844] ? perf_trace_lock+0xeb/0x510 [ 419.612001] ? zap_class+0x460/0x460 [ 419.615716] ? lock_acquire+0x16f/0x3f0 [ 419.619697] ? nf_sockopt_find.constprop.0+0x2d/0x290 [ 419.624911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.630452] ? cap_capable+0x205/0x270 [ 419.634349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.639896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.645442] ? ns_capable_common+0x141/0x170 [ 419.649862] do_ipt_get_ctl+0x177/0x930 [ 419.653841] ? zap_class+0x460/0x460 [ 419.657566] ? cache_grow_begin.cold+0x2e/0x31 [ 419.662166] ? get_info+0x570/0x570 [ 419.665791] ? find_held_lock+0x35/0x130 [ 419.669945] ? wait_for_completion+0x440/0x440 [ 419.674542] ? mutex_unlock+0xd/0x10 [ 419.678267] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 419.683551] nf_getsockopt+0x80/0xe0 [ 419.687287] ip_getsockopt+0x176/0x1d0 [ 419.691186] ? do_ip_getsockopt+0x1830/0x1830 [ 419.695689] ? kasan_check_write+0x14/0x20 [ 419.699938] udp_getsockopt+0x68/0xa0 [ 419.703747] sock_common_getsockopt+0x9a/0xe0 [ 419.708253] __sys_getsockopt+0x168/0x250 [ 419.712405] ? kernel_setsockopt+0x1e0/0x1e0 [ 419.716830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 419.721597] ? do_syscall_64+0x26/0x610 [ 419.725588] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.730958] ? do_syscall_64+0x26/0x610 [ 419.734940] __x64_sys_getsockopt+0xbe/0x150 [ 419.739357] do_syscall_64+0x103/0x610 [ 419.743255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.748451] RIP: 0033:0x457e29 [ 419.751648] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.770556] RSP: 002b:00007f714de81c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 419.778279] RAX: ffffffffffffffda RBX: 00007f714de81c90 RCX: 0000000000457e29 [ 419.785549] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 419.792828] RBP: 000000000073bf00 R08: 0000000020000080 R09: 0000000000000000 [ 419.800100] R10: 0000000020000000 R11: 0000000000000246 R12: 00007f714de826d4 [ 419.807370] R13: 00000000004be985 R14: 00000000004cf780 R15: 0000000000000004 19:37:20 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:20 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'syzkax\xf3B\x9f0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) mkdir(0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f00000001c0)=""/163, 0x0) r0 = semget(0x3, 0x3, 0x295) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) semctl$IPC_RMID(r0, 0x0, 0x0) 19:37:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:20 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:20 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x6400, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 420.065357] IPVS: ftp: loaded support on port[0] = 21 [ 420.083839] IPVS: ftp: loaded support on port[0] = 21 19:37:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x200000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000200)=""/192) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in, 0x0, 0x0, 0x9effffff}}, 0x28}, 0x8}, 0x0) 19:37:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 420.365956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 19:37:21 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB], 0x20000108}}, 0x0) [ 420.582394] IPVS: ftp: loaded support on port[0] = 21 19:37:22 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:22 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:22 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x8202, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:22 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 421.609292] FAULT_INJECTION: forcing a failure. [ 421.609292] name failslab, interval 1, probability 0, space 0, times 0 [ 421.654937] IPVS: ftp: loaded support on port[0] = 21 [ 421.660375] CPU: 0 PID: 18461 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 421.667666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.668831] IPVS: ftp: loaded support on port[0] = 21 [ 421.677021] Call Trace: [ 421.677049] dump_stack+0x172/0x1f0 [ 421.677071] should_fail.cold+0xa/0x1b [ 421.677088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 421.677106] ? lock_downgrade+0x810/0x810 [ 421.701625] ? ___might_sleep+0x163/0x280 [ 421.705803] __should_failslab+0x121/0x190 [ 421.710056] should_failslab+0x9/0x14 [ 421.713866] kmem_cache_alloc_node_trace+0x270/0x720 [ 421.718978] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 421.724522] ? free_uid+0xa1/0x250 [ 421.728067] ? find_user+0x130/0x130 [ 421.731802] __kmalloc_node+0x3d/0x70 [ 421.735692] bpf_map_area_alloc+0x40/0x90 [ 421.739854] array_map_alloc+0x2d6/0x600 [ 421.743926] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 421.743944] __do_sys_bpf+0x88b/0x3c10 [ 421.743963] ? bpf_prog_load+0x1490/0x1490 [ 421.757322] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 421.757340] ? check_preemption_disabled+0x48/0x290 [ 421.757356] ? wait_for_completion+0x440/0x440 [ 421.771818] ? __sb_end_write+0xd9/0x110 [ 421.775891] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 421.781458] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 421.786220] ? do_syscall_64+0x26/0x610 [ 421.790194] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.790213] ? do_syscall_64+0x26/0x610 [ 421.790238] __x64_sys_bpf+0x73/0xb0 [ 421.803249] do_syscall_64+0x103/0x610 [ 421.807152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.812346] RIP: 0033:0x457e29 [ 421.815542] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.834449] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 421.834464] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 19:37:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:22 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 421.834473] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 421.834481] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 421.834488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 421.834497] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 19:37:22 executing program 0 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 422.013522] FAULT_INJECTION: forcing a failure. [ 422.013522] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 422.027016] CPU: 0 PID: 18481 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 422.034306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.043660] Call Trace: [ 422.046338] dump_stack+0x172/0x1f0 [ 422.049986] should_fail.cold+0xa/0x1b [ 422.053872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 422.053891] ? ___might_sleep+0x163/0x280 [ 422.053915] should_fail_alloc_page+0x50/0x60 [ 422.053929] __alloc_pages_nodemask+0x1a1/0x710 [ 422.053940] ? zap_class+0x460/0x460 [ 422.053957] ? __alloc_pages_slowpath+0x2900/0x2900 [ 422.067664] ? __lock_is_held+0xb6/0x140 [ 422.067687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.067758] ? find_next_bit+0x107/0x130 [ 422.067781] pcpu_populate_chunk+0xf8/0x940 [ 422.085189] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 422.085204] ? find_next_bit+0x17/0x130 [ 422.085229] pcpu_alloc+0xccf/0x12e0 [ 422.085257] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 422.085282] __alloc_percpu_gfp+0x28/0x30 [ 422.099158] array_map_alloc+0x506/0x600 [ 422.099180] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 422.099198] __do_sys_bpf+0x88b/0x3c10 [ 422.117584] ? bpf_prog_load+0x1490/0x1490 [ 422.117602] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 422.117618] ? check_preemption_disabled+0x48/0x290 [ 422.131063] ? wait_for_completion+0x440/0x440 [ 422.131086] ? __sb_end_write+0xd9/0x110 [ 422.131105] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 422.149030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 422.149046] ? do_syscall_64+0x26/0x610 [ 422.149062] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.167946] ? do_syscall_64+0x26/0x610 [ 422.167972] __x64_sys_bpf+0x73/0xb0 [ 422.167989] do_syscall_64+0x103/0x610 [ 422.181266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.181280] RIP: 0033:0x457e29 [ 422.181297] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.216256] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 422.223978] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 422.231253] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 422.238534] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 422.245804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 422.253069] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 424.962076] net_ratelimit: 31 callbacks suppressed [ 424.962085] protocol 88fb is buggy, dev hsr_slave_0 [ 424.972157] protocol 88fb is buggy, dev hsr_slave_1 [ 425.122042] protocol 88fb is buggy, dev hsr_slave_0 [ 425.122073] protocol 88fb is buggy, dev hsr_slave_1 [ 425.127128] protocol 88fb is buggy, dev hsr_slave_1 [ 425.132210] protocol 88fb is buggy, dev hsr_slave_0 [ 425.142237] protocol 88fb is buggy, dev hsr_slave_1 [ 425.147371] protocol 88fb is buggy, dev hsr_slave_0 [ 425.152452] protocol 88fb is buggy, dev hsr_slave_1 [ 425.442034] protocol 88fb is buggy, dev hsr_slave_0 [ 429.585672] device hsr_slave_1 left promiscuous mode [ 429.626233] device hsr_slave_0 left promiscuous mode [ 429.679494] team0 (unregistering): Port device team_slave_1 removed [ 429.690423] team0 (unregistering): Port device team_slave_0 removed [ 429.700939] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 429.738734] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 429.829372] bond0 (unregistering): Released all slaves [ 431.202050] net_ratelimit: 26 callbacks suppressed [ 431.202058] protocol 88fb is buggy, dev hsr_slave_0 [ 431.212094] protocol 88fb is buggy, dev hsr_slave_1 [ 431.362090] protocol 88fb is buggy, dev hsr_slave_0 [ 431.362127] protocol 88fb is buggy, dev hsr_slave_0 [ 431.367195] protocol 88fb is buggy, dev hsr_slave_1 [ 431.372221] protocol 88fb is buggy, dev hsr_slave_1 [ 431.382297] protocol 88fb is buggy, dev hsr_slave_0 [ 431.387324] protocol 88fb is buggy, dev hsr_slave_1 [ 431.682092] protocol 88fb is buggy, dev hsr_slave_0 [ 431.687176] protocol 88fb is buggy, dev hsr_slave_1 19:37:36 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x800340, 0x2000000020b, 0x1, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0x9cf0000008, 0x9}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x201, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x80) 19:37:36 executing program 0 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:36 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:36 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x8800, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:36 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 435.940939] IPVS: ftp: loaded support on port[0] = 21 [ 435.961443] IPVS: ftp: loaded support on port[0] = 21 [ 435.977760] FAULT_INJECTION: forcing a failure. [ 435.977760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 436.023311] CPU: 0 PID: 18505 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 436.030617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.030624] Call Trace: [ 436.030649] dump_stack+0x172/0x1f0 [ 436.030668] should_fail.cold+0xa/0x1b [ 436.030684] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 436.030701] ? ___might_sleep+0x163/0x280 [ 436.030722] should_fail_alloc_page+0x50/0x60 [ 436.030743] __alloc_pages_nodemask+0x1a1/0x710 [ 436.030758] ? zap_class+0x460/0x460 19:37:37 executing program 0 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 436.030776] ? __alloc_pages_slowpath+0x2900/0x2900 [ 436.030790] ? __lock_is_held+0xb6/0x140 [ 436.030811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.030826] ? find_next_bit+0x107/0x130 [ 436.030848] pcpu_populate_chunk+0xf8/0x940 [ 436.030862] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 436.030876] ? find_next_bit+0x17/0x130 [ 436.030899] pcpu_alloc+0xccf/0x12e0 [ 436.030929] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 436.030958] __alloc_percpu_gfp+0x28/0x30 [ 436.030975] array_map_alloc+0x506/0x600 [ 436.030996] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 436.031015] __do_sys_bpf+0x88b/0x3c10 [ 436.031036] ? bpf_prog_load+0x1490/0x1490 [ 436.031051] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 436.031068] ? check_preemption_disabled+0x48/0x290 [ 436.031085] ? wait_for_completion+0x440/0x440 [ 436.031105] ? __sb_end_write+0xd9/0x110 [ 436.031124] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 436.031151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 436.031166] ? do_syscall_64+0x26/0x610 [ 436.031180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.031194] ? do_syscall_64+0x26/0x610 [ 436.031216] __x64_sys_bpf+0x73/0xb0 [ 436.031233] do_syscall_64+0x103/0x610 [ 436.031252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.031264] RIP: 0033:0x457e29 [ 436.031280] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.031288] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 19:37:37 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x800340, 0x2000000020b, 0x1, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0x9cf0000008, 0x9}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x201, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x80) 19:37:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 436.031303] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 436.031312] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 436.031321] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 436.031330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 436.031339] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 436.203798] IPVS: ftp: loaded support on port[0] = 21 [ 436.297535] FAULT_INJECTION: forcing a failure. [ 436.297535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 436.385405] CPU: 1 PID: 18512 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 436.392715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.392722] Call Trace: [ 436.392745] dump_stack+0x172/0x1f0 [ 436.392765] should_fail.cold+0xa/0x1b [ 436.392782] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 436.392800] ? ___might_sleep+0x163/0x280 [ 436.392823] should_fail_alloc_page+0x50/0x60 [ 436.392837] __alloc_pages_nodemask+0x1a1/0x710 [ 436.392853] ? zap_class+0x460/0x460 [ 436.392868] ? __alloc_pages_slowpath+0x2900/0x2900 [ 436.392878] ? __lock_is_held+0xb6/0x140 [ 436.392895] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.392907] ? find_next_bit+0x107/0x130 [ 436.392929] pcpu_populate_chunk+0xf8/0x940 [ 436.392940] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 436.412548] ? find_next_bit+0x17/0x130 [ 436.412574] pcpu_alloc+0xccf/0x12e0 [ 436.412600] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 436.412628] __alloc_percpu_gfp+0x28/0x30 [ 436.412645] array_map_alloc+0x506/0x600 [ 436.412664] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 436.412683] __do_sys_bpf+0x88b/0x3c10 [ 436.412704] ? bpf_prog_load+0x1490/0x1490 [ 436.412720] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 436.412736] ? check_preemption_disabled+0x48/0x290 [ 436.412752] ? wait_for_completion+0x440/0x440 [ 436.421981] ? __sb_end_write+0xd9/0x110 [ 436.422000] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 436.422026] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 436.422040] ? do_syscall_64+0x26/0x610 [ 436.422053] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 19:37:37 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') r2 = memfd_create(&(0x7f0000000000)='\xac\x01\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000100)='net\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 436.422069] ? do_syscall_64+0x26/0x610 [ 436.497026] __x64_sys_bpf+0x73/0xb0 [ 436.497047] do_syscall_64+0x103/0x610 [ 436.497072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.497082] RIP: 0033:0x457e29 [ 436.497095] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.574204] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 19:37:37 executing program 0 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 436.581921] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 436.581931] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 436.581940] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 436.581949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 436.581959] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 436.738480] FAULT_INJECTION: forcing a failure. [ 436.738480] name failslab, interval 1, probability 0, space 0, times 0 [ 436.834688] CPU: 1 PID: 18531 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 436.842004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.851368] Call Trace: [ 436.853976] dump_stack+0x172/0x1f0 [ 436.857621] should_fail.cold+0xa/0x1b [ 436.861519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 436.866636] ? lock_downgrade+0x810/0x810 [ 436.870797] ? ___might_sleep+0x163/0x280 [ 436.874958] __should_failslab+0x121/0x190 [ 436.879202] should_failslab+0x9/0x14 [ 436.883011] kmem_cache_alloc_node_trace+0x270/0x720 [ 436.888116] ? kasan_check_read+0x11/0x20 [ 436.892269] ? do_raw_spin_unlock+0x57/0x270 [ 436.896696] __kmalloc_node+0x3d/0x70 [ 436.900569] __vmalloc_node_range+0x201/0x790 [ 436.905087] __vmalloc+0x44/0x50 [ 436.908462] ? pcpu_mem_zalloc+0x8a/0xf0 [ 436.912534] pcpu_mem_zalloc+0x8a/0xf0 [ 436.916427] pcpu_create_chunk+0xd1/0x8d0 [ 436.920594] pcpu_alloc+0x1087/0x12e0 [ 436.924421] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 436.929203] __alloc_percpu_gfp+0x28/0x30 [ 436.933370] array_map_alloc+0x506/0x600 [ 436.937443] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 436.942734] __do_sys_bpf+0x88b/0x3c10 [ 436.946640] ? bpf_prog_load+0x1490/0x1490 [ 436.950889] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 436.955742] ? check_preemption_disabled+0x48/0x290 [ 436.960774] ? wait_for_completion+0x440/0x440 [ 436.965377] ? __sb_end_write+0xd9/0x110 [ 436.969455] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 436.975013] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 436.979775] ? do_syscall_64+0x26/0x610 [ 436.983758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.989124] ? do_syscall_64+0x26/0x610 [ 436.993118] __x64_sys_bpf+0x73/0xb0 [ 436.996842] do_syscall_64+0x103/0x610 [ 437.000751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.005944] RIP: 0033:0x457e29 [ 437.009143] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:37:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 437.028050] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 437.035770] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 437.043387] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 437.043395] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 437.043410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 437.043418] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 19:37:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:38 executing program 0 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 437.219550] IPVS: ftp: loaded support on port[0] = 21 [ 437.240382] IPVS: ftp: loaded support on port[0] = 21 19:37:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 437.316704] FAULT_INJECTION: forcing a failure. [ 437.316704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 437.357838] CPU: 1 PID: 18551 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 437.365155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.374515] Call Trace: [ 437.377112] dump_stack+0x172/0x1f0 [ 437.380757] should_fail.cold+0xa/0x1b [ 437.384657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 437.389768] ? ___might_sleep+0x163/0x280 [ 437.393932] should_fail_alloc_page+0x50/0x60 [ 437.398434] __alloc_pages_nodemask+0x1a1/0x710 [ 437.403118] ? __alloc_pages_slowpath+0x2900/0x2900 [ 437.408206] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 437.413676] ? kasan_unpoison_shadow+0x35/0x50 [ 437.418269] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 437.423825] alloc_pages_current+0x107/0x210 [ 437.428243] __vmalloc_node_range+0x4b0/0x790 [ 437.432760] __vmalloc+0x44/0x50 [ 437.436140] ? pcpu_mem_zalloc+0x8a/0xf0 [ 437.440207] pcpu_mem_zalloc+0x8a/0xf0 [ 437.444102] pcpu_create_chunk+0xd1/0x8d0 [ 437.448273] pcpu_alloc+0x1087/0x12e0 [ 437.452095] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 437.452127] __alloc_percpu_gfp+0x28/0x30 [ 437.452145] array_map_alloc+0x506/0x600 [ 437.465082] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 437.470366] __do_sys_bpf+0x88b/0x3c10 [ 437.474260] ? bpf_prog_load+0x1490/0x1490 [ 437.474278] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 437.483340] ? check_preemption_disabled+0x48/0x290 [ 437.488360] ? wait_for_completion+0x440/0x440 [ 437.492947] ? __sb_end_write+0xd9/0x110 [ 437.492967] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 437.492992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 437.493008] ? do_syscall_64+0x26/0x610 [ 437.511306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.516672] ? do_syscall_64+0x26/0x610 [ 437.516696] __x64_sys_bpf+0x73/0xb0 [ 437.516712] do_syscall_64+0x103/0x610 [ 437.528356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.533546] RIP: 0033:0x457e29 [ 437.536743] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.555731] RSP: 002b:00007fd73727bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 437.555746] RAX: ffffffffffffffda RBX: 00007fd73727bc90 RCX: 0000000000457e29 [ 437.555756] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 437.555765] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 437.555773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73727c6d4 [ 437.555782] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 437.555988] net_ratelimit: 25 callbacks suppressed [ 437.555994] protocol 88fb is buggy, dev hsr_slave_0 [ 437.593057] protocol 88fb is buggy, dev hsr_slave_1 [ 437.602033] protocol 88fb is buggy, dev hsr_slave_0 [ 437.605471] protocol 88fb is buggy, dev hsr_slave_0 [ 437.610278] protocol 88fb is buggy, dev hsr_slave_1 [ 437.615327] protocol 88fb is buggy, dev hsr_slave_1 [ 437.620369] protocol 88fb is buggy, dev hsr_slave_0 [ 437.630374] protocol 88fb is buggy, dev hsr_slave_1 [ 437.922079] protocol 88fb is buggy, dev hsr_slave_0 [ 437.927191] protocol 88fb is buggy, dev hsr_slave_1 19:37:40 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x4, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 439.656869] IPVS: ftp: loaded support on port[0] = 21 [ 440.048572] IPVS: ftp: loaded support on port[0] = 21 19:37:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:41 executing program 0 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:41 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x9800, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:41 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x11, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:41 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 440.618806] IPVS: ftp: loaded support on port[0] = 21 [ 440.631041] FAULT_INJECTION: forcing a failure. [ 440.631041] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 440.673661] CPU: 0 PID: 18596 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 440.680974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.680980] Call Trace: [ 440.681003] dump_stack+0x172/0x1f0 [ 440.681024] should_fail.cold+0xa/0x1b [ 440.681041] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 440.700467] ? ___might_sleep+0x163/0x280 [ 440.700494] should_fail_alloc_page+0x50/0x60 [ 440.700510] __alloc_pages_nodemask+0x1a1/0x710 [ 440.700530] ? __alloc_pages_slowpath+0x2900/0x2900 [ 440.700547] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 440.700566] ? __lock_is_held+0xb6/0x140 [ 440.700589] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 440.739005] alloc_pages_current+0x107/0x210 [ 440.743426] ? ___might_sleep+0x163/0x280 [ 440.747589] __vmalloc_node_range+0x4b0/0x790 [ 440.752117] __vmalloc+0x44/0x50 [ 440.755487] ? pcpu_mem_zalloc+0x8a/0xf0 [ 440.755504] pcpu_mem_zalloc+0x8a/0xf0 [ 440.755522] pcpu_create_chunk+0xd1/0x8d0 [ 440.755542] pcpu_alloc+0x1087/0x12e0 [ 440.755572] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 440.755597] __alloc_percpu_gfp+0x28/0x30 [ 440.767661] array_map_alloc+0x506/0x600 [ 440.767683] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 440.767703] __do_sys_bpf+0x88b/0x3c10 [ 440.767725] ? bpf_prog_load+0x1490/0x1490 [ 440.767742] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 440.767761] ? check_preemption_disabled+0x48/0x290 [ 440.767783] ? wait_for_completion+0x440/0x440 [ 440.789795] ? __sb_end_write+0xd9/0x110 [ 440.789819] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 440.789848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 440.789868] ? do_syscall_64+0x26/0x610 [ 440.789888] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.789909] ? do_syscall_64+0x26/0x610 [ 440.789931] __x64_sys_bpf+0x73/0xb0 [ 440.812422] do_syscall_64+0x103/0x610 [ 440.812445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.812458] RIP: 0033:0x457e29 19:37:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 440.812471] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.812479] RSP: 002b:00007fd73727bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 440.812494] RAX: ffffffffffffffda RBX: 00007fd73727bc90 RCX: 0000000000457e29 [ 440.812503] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 440.812512] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 440.812520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73727c6d4 [ 440.812531] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 440.997588] IPVS: ftp: loaded support on port[0] = 21 [ 441.022481] IPVS: ftp: loaded support on port[0] = 21 19:37:41 executing program 0 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 441.221403] FAULT_INJECTION: forcing a failure. [ 441.221403] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 441.242328] CPU: 1 PID: 18610 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 441.249632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.258994] Call Trace: [ 441.259018] dump_stack+0x172/0x1f0 [ 441.259047] should_fail.cold+0xa/0x1b [ 441.259062] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 441.259080] ? ___might_sleep+0x163/0x280 [ 441.274242] should_fail_alloc_page+0x50/0x60 [ 441.274258] __alloc_pages_nodemask+0x1a1/0x710 [ 441.274276] ? __alloc_pages_slowpath+0x2900/0x2900 [ 441.274292] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 441.274309] ? __lock_is_held+0xb6/0x140 [ 441.274328] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 441.274347] alloc_pages_current+0x107/0x210 [ 441.312048] ? ___might_sleep+0x163/0x280 [ 441.316211] __vmalloc_node_range+0x4b0/0x790 [ 441.320725] __vmalloc+0x44/0x50 [ 441.320741] ? pcpu_mem_zalloc+0x8a/0xf0 [ 441.320758] pcpu_mem_zalloc+0x8a/0xf0 [ 441.320775] pcpu_create_chunk+0xd1/0x8d0 [ 441.320797] pcpu_alloc+0x1087/0x12e0 [ 441.340031] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 441.344805] __alloc_percpu_gfp+0x28/0x30 [ 441.344826] array_map_alloc+0x506/0x600 [ 441.344854] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 441.344870] __do_sys_bpf+0x88b/0x3c10 [ 441.344888] ? bpf_prog_load+0x1490/0x1490 [ 441.366443] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 441.366464] ? check_preemption_disabled+0x48/0x290 [ 441.366481] ? wait_for_completion+0x440/0x440 [ 441.366503] ? __sb_end_write+0xd9/0x110 [ 441.366524] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 441.390505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 441.390522] ? do_syscall_64+0x26/0x610 [ 441.390539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.390553] ? do_syscall_64+0x26/0x610 [ 441.390576] __x64_sys_bpf+0x73/0xb0 [ 441.390592] do_syscall_64+0x103/0x610 [ 441.416192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.421389] RIP: 0033:0x457e29 [ 441.424586] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.443485] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 441.443501] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 441.443510] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 441.443520] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 441.443529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 441.443538] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 19:37:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 19:37:42 executing program 0 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 19:37:42 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 441.704708] FAULT_INJECTION: forcing a failure. [ 441.704708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 441.764388] CPU: 0 PID: 18737 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 441.771708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.781087] Call Trace: [ 441.783683] dump_stack+0x172/0x1f0 [ 441.787333] should_fail.cold+0xa/0x1b [ 441.791234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 441.796359] ? ___might_sleep+0x163/0x280 [ 441.800547] should_fail_alloc_page+0x50/0x60 [ 441.805049] __alloc_pages_nodemask+0x1a1/0x710 [ 441.809725] ? __alloc_pages_slowpath+0x2900/0x2900 [ 441.814748] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 441.820214] ? __lock_is_held+0xb6/0x140 [ 441.824286] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 441.829838] alloc_pages_current+0x107/0x210 [ 441.829854] ? ___might_sleep+0x163/0x280 [ 441.829874] __vmalloc_node_range+0x4b0/0x790 [ 441.829903] __vmalloc+0x44/0x50 [ 441.842925] ? pcpu_mem_zalloc+0x8a/0xf0 [ 441.842942] pcpu_mem_zalloc+0x8a/0xf0 [ 441.842957] pcpu_create_chunk+0xd1/0x8d0 [ 441.842975] pcpu_alloc+0x1087/0x12e0 [ 441.843016] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 441.843045] __alloc_percpu_gfp+0x28/0x30 [ 441.843064] array_map_alloc+0x506/0x600 [ 441.843085] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 441.854377] __do_sys_bpf+0x88b/0x3c10 [ 441.854399] ? bpf_prog_load+0x1490/0x1490 [ 441.854416] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 441.854435] ? check_preemption_disabled+0x48/0x290 [ 441.854451] ? wait_for_completion+0x440/0x440 [ 441.854470] ? __sb_end_write+0xd9/0x110 [ 441.862428] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 441.862456] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 441.862471] ? do_syscall_64+0x26/0x610 [ 441.862487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.862501] ? do_syscall_64+0x26/0x610 [ 441.862524] __x64_sys_bpf+0x73/0xb0 [ 441.862540] do_syscall_64+0x103/0x610 [ 441.871427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.871440] RIP: 0033:0x457e29 [ 441.871455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.871463] RSP: 002b:00007fd73727bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 441.880786] RAX: ffffffffffffffda RBX: 00007fd73727bc90 RCX: 0000000000457e29 [ 441.880796] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 441.880805] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 441.880814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73727c6d4 [ 441.880824] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 441.985166] IPVS: ftp: loaded support on port[0] = 21 19:37:43 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xa600, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 442.178163] IPVS: ftp: loaded support on port[0] = 21 [ 442.421175] IPVS: ftp: loaded support on port[0] = 21 [ 443.842037] net_ratelimit: 26 callbacks suppressed [ 443.842045] protocol 88fb is buggy, dev hsr_slave_0 [ 443.842082] protocol 88fb is buggy, dev hsr_slave_1 [ 443.847040] protocol 88fb is buggy, dev hsr_slave_1 [ 443.852149] protocol 88fb is buggy, dev hsr_slave_0 [ 443.857145] protocol 88fb is buggy, dev hsr_slave_0 [ 443.862133] protocol 88fb is buggy, dev hsr_slave_1 [ 443.867132] protocol 88fb is buggy, dev hsr_slave_1 [ 444.162178] protocol 88fb is buggy, dev hsr_slave_0 [ 444.167271] protocol 88fb is buggy, dev hsr_slave_1 [ 444.172403] protocol 88fb is buggy, dev hsr_slave_0 19:37:45 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1d, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:45 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 19:37:45 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x0]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:45 executing program 0 (fault-call:3 fault-nth:9): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:45 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xc801, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 444.864025] IPVS: ftp: loaded support on port[0] = 21 [ 444.867384] IPVS: ftp: loaded support on port[0] = 21 [ 444.896854] FAULT_INJECTION: forcing a failure. [ 444.896854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 444.923129] CPU: 1 PID: 18771 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 444.930431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.930437] Call Trace: [ 444.930461] dump_stack+0x172/0x1f0 [ 444.930481] should_fail.cold+0xa/0x1b [ 444.930498] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 444.946035] ? ___might_sleep+0x163/0x280 [ 444.946062] should_fail_alloc_page+0x50/0x60 [ 444.946077] __alloc_pages_nodemask+0x1a1/0x710 [ 444.946096] ? __alloc_pages_slowpath+0x2900/0x2900 [ 444.955059] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 444.955079] ? __lock_is_held+0xb6/0x140 [ 444.955099] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 444.955120] alloc_pages_current+0x107/0x210 [ 444.955133] ? ___might_sleep+0x163/0x280 [ 444.955154] __vmalloc_node_range+0x4b0/0x790 [ 444.968452] __vmalloc+0x44/0x50 [ 444.968467] ? pcpu_mem_zalloc+0x8a/0xf0 [ 444.978912] pcpu_mem_zalloc+0x8a/0xf0 [ 444.988475] pcpu_create_chunk+0xd1/0x8d0 [ 444.988496] pcpu_alloc+0x1087/0x12e0 [ 444.988525] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 444.988552] __alloc_percpu_gfp+0x28/0x30 [ 445.001554] array_map_alloc+0x506/0x600 [ 445.001573] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 445.001598] __do_sys_bpf+0x88b/0x3c10 [ 445.001618] ? bpf_prog_load+0x1490/0x1490 [ 445.001632] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 445.001649] ? check_preemption_disabled+0x48/0x290 [ 445.013005] ? wait_for_completion+0x440/0x440 [ 445.013028] ? __sb_end_write+0xd9/0x110 [ 445.013047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 445.013074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 445.020990] ? do_syscall_64+0x26/0x610 [ 445.021007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.021018] ? do_syscall_64+0x26/0x610 [ 445.021039] __x64_sys_bpf+0x73/0xb0 [ 445.034049] do_syscall_64+0x103/0x610 [ 445.034071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.034082] RIP: 0033:0x457e29 19:37:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 445.034098] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.034105] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.047469] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 445.047479] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 445.047488] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 445.047498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 445.047508] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 445.298515] IPVS: ftp: loaded support on port[0] = 21 19:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:46 executing program 0 (fault-call:3 fault-nth:10): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 445.513816] FAULT_INJECTION: forcing a failure. [ 445.513816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 445.563075] CPU: 0 PID: 18797 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 445.570375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.579736] Call Trace: [ 445.579760] dump_stack+0x172/0x1f0 [ 445.579779] should_fail.cold+0xa/0x1b [ 445.579794] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 445.579810] ? ___might_sleep+0x163/0x280 [ 445.579831] should_fail_alloc_page+0x50/0x60 [ 445.579845] __alloc_pages_nodemask+0x1a1/0x710 [ 445.579862] ? __alloc_pages_slowpath+0x2900/0x2900 [ 445.579876] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 445.579894] ? __lock_is_held+0xb6/0x140 [ 445.579913] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 445.579935] alloc_pages_current+0x107/0x210 [ 445.579948] ? ___might_sleep+0x163/0x280 [ 445.579966] __vmalloc_node_range+0x4b0/0x790 [ 445.579987] __vmalloc+0x44/0x50 [ 445.644798] ? pcpu_mem_zalloc+0x8a/0xf0 [ 445.648869] pcpu_mem_zalloc+0x8a/0xf0 [ 445.652772] pcpu_create_chunk+0xd1/0x8d0 [ 445.656931] pcpu_alloc+0x1087/0x12e0 [ 445.660767] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 445.665548] __alloc_percpu_gfp+0x28/0x30 [ 445.669705] array_map_alloc+0x506/0x600 [ 445.669735] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 445.679060] __do_sys_bpf+0x88b/0x3c10 [ 445.679082] ? bpf_prog_load+0x1490/0x1490 [ 445.679101] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 445.692025] ? check_preemption_disabled+0x48/0x290 [ 445.697497] ? wait_for_completion+0x440/0x440 [ 445.702097] ? __sb_end_write+0xd9/0x110 [ 445.706173] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 19:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 445.711767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 445.716535] ? do_syscall_64+0x26/0x610 [ 445.720518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.725889] ? do_syscall_64+0x26/0x610 [ 445.729883] __x64_sys_bpf+0x73/0xb0 [ 445.733608] do_syscall_64+0x103/0x610 [ 445.737512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.742702] RIP: 0033:0x457e29 [ 445.745907] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.764825] RSP: 002b:00007fd73727bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.772542] RAX: ffffffffffffffda RBX: 00007fd73727bc90 RCX: 0000000000457e29 [ 445.779815] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 445.779824] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 445.779834] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73727c6d4 [ 445.779849] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 445.817528] IPVS: ftp: loaded support on port[0] = 21 [ 445.912544] IPVS: ftp: loaded support on port[0] = 21 19:37:47 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x82, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:37:47 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 446.399425] IPVS: ftp: loaded support on port[0] = 21 [ 446.672735] IPVS: ftp: loaded support on port[0] = 21 19:37:50 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x0]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:50 executing program 0 (fault-call:3 fault-nth:11): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 449.620545] FAULT_INJECTION: forcing a failure. [ 449.620545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 449.672060] CPU: 0 PID: 18934 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 449.679366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.688718] Call Trace: [ 449.691320] dump_stack+0x172/0x1f0 [ 449.694955] should_fail.cold+0xa/0x1b [ 449.698847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 449.703956] ? ___might_sleep+0x163/0x280 [ 449.708114] should_fail_alloc_page+0x50/0x60 [ 449.712612] __alloc_pages_nodemask+0x1a1/0x710 [ 449.717295] ? __alloc_pages_slowpath+0x2900/0x2900 [ 449.722316] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 449.727773] ? __lock_is_held+0xb6/0x140 [ 449.731837] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 449.737383] alloc_pages_current+0x107/0x210 [ 449.741793] ? ___might_sleep+0x163/0x280 [ 449.745950] __vmalloc_node_range+0x4b0/0x790 [ 449.750467] __vmalloc+0x44/0x50 [ 449.753840] ? pcpu_mem_zalloc+0x8a/0xf0 [ 449.757906] pcpu_mem_zalloc+0x8a/0xf0 [ 449.761795] pcpu_create_chunk+0xd1/0x8d0 [ 449.765951] pcpu_alloc+0x1087/0x12e0 [ 449.769777] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 449.774548] __alloc_percpu_gfp+0x28/0x30 [ 449.778700] array_map_alloc+0x506/0x600 [ 449.782775] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 449.788056] __do_sys_bpf+0x88b/0x3c10 [ 449.791955] ? bpf_prog_load+0x1490/0x1490 [ 449.796190] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 449.801037] ? check_preemption_disabled+0x48/0x290 [ 449.806056] ? wait_for_completion+0x440/0x440 [ 449.810649] ? __sb_end_write+0xd9/0x110 [ 449.814716] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 449.820269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 449.825029] ? do_syscall_64+0x26/0x610 [ 449.829007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.834371] ? do_syscall_64+0x26/0x610 [ 449.838356] __x64_sys_bpf+0x73/0xb0 [ 449.842079] do_syscall_64+0x103/0x610 [ 449.845976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.851174] RIP: 0033:0x457e29 [ 449.854371] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.873281] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 449.880995] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 449.888268] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 449.895538] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 449.902809] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 449.910077] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 449.980089] IPVS: ftp: loaded support on port[0] = 21 [ 450.082040] net_ratelimit: 25 callbacks suppressed [ 450.082047] protocol 88fb is buggy, dev hsr_slave_0 [ 450.082051] protocol 88fb is buggy, dev hsr_slave_0 [ 450.082090] protocol 88fb is buggy, dev hsr_slave_1 [ 450.087085] protocol 88fb is buggy, dev hsr_slave_1 [ 450.092150] protocol 88fb is buggy, dev hsr_slave_0 [ 450.097125] protocol 88fb is buggy, dev hsr_slave_0 [ 450.102130] protocol 88fb is buggy, dev hsr_slave_1 [ 450.107114] protocol 88fb is buggy, dev hsr_slave_1 [ 450.402039] protocol 88fb is buggy, dev hsr_slave_0 [ 450.407140] protocol 88fb is buggy, dev hsr_slave_1 19:37:51 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xdc01, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:51 executing program 0 (fault-call:3 fault-nth:12): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:51 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x0]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:51 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x88, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 451.031617] IPVS: ftp: loaded support on port[0] = 21 [ 451.058348] IPVS: ftp: loaded support on port[0] = 21 [ 451.071142] FAULT_INJECTION: forcing a failure. [ 451.071142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 451.130998] CPU: 0 PID: 18952 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 451.138313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.147683] Call Trace: [ 451.150281] dump_stack+0x172/0x1f0 [ 451.153919] should_fail.cold+0xa/0x1b [ 451.157817] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 451.162927] ? ___might_sleep+0x163/0x280 [ 451.167091] should_fail_alloc_page+0x50/0x60 [ 451.171593] __alloc_pages_nodemask+0x1a1/0x710 [ 451.176277] ? __alloc_pages_slowpath+0x2900/0x2900 [ 451.181305] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 451.186775] ? __lock_is_held+0xb6/0x140 [ 451.190853] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 451.196407] alloc_pages_current+0x107/0x210 [ 451.200821] ? ___might_sleep+0x163/0x280 [ 451.204980] __vmalloc_node_range+0x4b0/0x790 [ 451.209493] __vmalloc+0x44/0x50 [ 451.212864] ? pcpu_mem_zalloc+0x8a/0xf0 [ 451.216932] pcpu_mem_zalloc+0x8a/0xf0 [ 451.220828] pcpu_create_chunk+0xd1/0x8d0 [ 451.225000] pcpu_alloc+0x1087/0x12e0 [ 451.228823] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 451.233600] __alloc_percpu_gfp+0x28/0x30 [ 451.237762] array_map_alloc+0x506/0x600 [ 451.241830] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 451.247150] __do_sys_bpf+0x88b/0x3c10 [ 451.251078] ? bpf_prog_load+0x1490/0x1490 [ 451.255330] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 451.260180] ? check_preemption_disabled+0x48/0x290 [ 451.265203] ? wait_for_completion+0x440/0x440 [ 451.269796] ? __sb_end_write+0xd9/0x110 [ 451.273858] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 451.279403] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 451.284166] ? do_syscall_64+0x26/0x610 [ 451.288142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.293511] ? do_syscall_64+0x26/0x610 [ 451.297494] __x64_sys_bpf+0x73/0xb0 [ 451.301214] do_syscall_64+0x103/0x610 [ 451.305117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.310317] RIP: 0033:0x457e29 19:37:52 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 451.313517] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.332429] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 451.340149] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 451.347424] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 451.354698] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 451.361968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 451.369241] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 451.475883] IPVS: ftp: loaded support on port[0] = 21 19:37:52 executing program 0 (fault-call:3 fault-nth:13): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:52 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 451.680309] FAULT_INJECTION: forcing a failure. [ 451.680309] name failslab, interval 1, probability 0, space 0, times 0 [ 451.736319] CPU: 0 PID: 18989 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 451.743637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.753001] Call Trace: [ 451.755610] dump_stack+0x172/0x1f0 [ 451.759249] should_fail.cold+0xa/0x1b [ 451.763154] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 451.768266] ? lock_downgrade+0x810/0x810 [ 451.772436] ? ___might_sleep+0x163/0x280 [ 451.776591] __should_failslab+0x121/0x190 [ 451.780840] should_failslab+0x9/0x14 [ 451.784655] kmem_cache_alloc_node_trace+0x270/0x720 [ 451.789773] ? free_vmap_block+0x100/0x100 [ 451.794027] __get_vm_area_node+0x12b/0x3a0 [ 451.798365] __vmalloc_node_range+0xd4/0x790 [ 451.802788] ? pcpu_mem_zalloc+0x8a/0xf0 [ 451.806873] __vmalloc+0x44/0x50 [ 451.810248] ? pcpu_mem_zalloc+0x8a/0xf0 [ 451.814333] pcpu_mem_zalloc+0x8a/0xf0 [ 451.818234] pcpu_create_chunk+0x119/0x8d0 [ 451.822480] pcpu_alloc+0x1087/0x12e0 [ 451.826312] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 451.831093] __alloc_percpu_gfp+0x28/0x30 [ 451.835248] array_map_alloc+0x506/0x600 [ 451.839335] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 451.844628] __do_sys_bpf+0x88b/0x3c10 [ 451.848534] ? bpf_prog_load+0x1490/0x1490 [ 451.852779] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 451.857630] ? check_preemption_disabled+0x48/0x290 [ 451.862652] ? wait_for_completion+0x440/0x440 [ 451.867247] ? __sb_end_write+0xd9/0x110 [ 451.871339] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 451.876898] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 451.881661] ? do_syscall_64+0x26/0x610 [ 451.881678] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.881693] ? do_syscall_64+0x26/0x610 [ 451.891018] __x64_sys_bpf+0x73/0xb0 [ 451.891039] do_syscall_64+0x103/0x610 [ 451.891059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.891073] RIP: 0033:0x457e29 [ 451.902614] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.929865] RSP: 002b:00007fd73727bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 451.937582] RAX: ffffffffffffffda RBX: 00007fd73727bc90 RCX: 0000000000457e29 [ 451.937599] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 451.937609] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 451.937618] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73727c6d4 [ 451.937628] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 451.994605] IPVS: ftp: loaded support on port[0] = 21 [ 452.009102] IPVS: ftp: loaded support on port[0] = 21 19:37:53 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x40000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:53 executing program 0 (fault-call:3 fault-nth:14): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 452.402274] FAULT_INJECTION: forcing a failure. [ 452.402274] name failslab, interval 1, probability 0, space 0, times 0 [ 452.462152] CPU: 1 PID: 19102 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 452.469464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.478821] Call Trace: [ 452.481426] dump_stack+0x172/0x1f0 [ 452.485077] should_fail.cold+0xa/0x1b [ 452.488979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 452.494090] ? lock_downgrade+0x810/0x810 [ 452.498257] ? ___might_sleep+0x163/0x280 [ 452.502416] __should_failslab+0x121/0x190 [ 452.506657] should_failslab+0x9/0x14 [ 452.510465] kmem_cache_alloc_node_trace+0x270/0x720 [ 452.515579] ? ___might_sleep+0x163/0x280 [ 452.519747] alloc_vmap_area+0x142/0xa00 [ 452.523811] ? __get_vm_area_node+0x12b/0x3a0 [ 452.528324] ? purge_vmap_area_lazy+0x40/0x40 [ 452.532833] ? free_vmap_block+0x100/0x100 [ 452.537085] __get_vm_area_node+0x179/0x3a0 [ 452.541420] __vmalloc_node_range+0xd4/0x790 [ 452.545830] ? pcpu_mem_zalloc+0x8a/0xf0 [ 452.549912] __vmalloc+0x44/0x50 [ 452.553279] ? pcpu_mem_zalloc+0x8a/0xf0 [ 452.557347] pcpu_mem_zalloc+0x8a/0xf0 [ 452.561252] pcpu_create_chunk+0x119/0x8d0 [ 452.565499] pcpu_alloc+0x1087/0x12e0 [ 452.569668] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 452.574446] __alloc_percpu_gfp+0x28/0x30 [ 452.578602] array_map_alloc+0x506/0x600 [ 452.582670] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 452.587951] __do_sys_bpf+0x88b/0x3c10 [ 452.591845] ? bpf_prog_load+0x1490/0x1490 [ 452.596086] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 452.600944] ? check_preemption_disabled+0x48/0x290 [ 452.605969] ? wait_for_completion+0x440/0x440 [ 452.610563] ? __sb_end_write+0xd9/0x110 [ 452.614638] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 452.620193] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 452.624964] ? do_syscall_64+0x26/0x610 [ 452.628942] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.634307] ? do_syscall_64+0x26/0x610 [ 452.638303] __x64_sys_bpf+0x73/0xb0 [ 452.642025] do_syscall_64+0x103/0x610 [ 452.645933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.651120] RIP: 0033:0x457e29 [ 452.654314] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 452.673231] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 452.680942] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 452.688225] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 452.695943] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 452.703231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 452.710513] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 452.787740] IPVS: ftp: loaded support on port[0] = 21 [ 452.897350] IPVS: ftp: loaded support on port[0] = 21 19:37:57 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:37:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:57 executing program 0 (fault-call:3 fault-nth:15): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:37:57 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:37:57 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8a, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 456.259301] IPVS: ftp: loaded support on port[0] = 21 [ 456.294219] FAULT_INJECTION: forcing a failure. [ 456.294219] name failslab, interval 1, probability 0, space 0, times 0 [ 456.322056] net_ratelimit: 25 callbacks suppressed [ 456.322065] protocol 88fb is buggy, dev hsr_slave_0 [ 456.322098] protocol 88fb is buggy, dev hsr_slave_1 [ 456.327053] protocol 88fb is buggy, dev hsr_slave_1 19:37:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 456.332153] protocol 88fb is buggy, dev hsr_slave_0 [ 456.337144] protocol 88fb is buggy, dev hsr_slave_0 [ 456.342176] protocol 88fb is buggy, dev hsr_slave_1 [ 456.347171] protocol 88fb is buggy, dev hsr_slave_1 [ 456.435455] CPU: 1 PID: 19130 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 456.442779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.452138] Call Trace: [ 456.454745] dump_stack+0x172/0x1f0 [ 456.458389] should_fail.cold+0xa/0x1b [ 456.462289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 456.467400] ? lock_downgrade+0x810/0x810 [ 456.471561] ? ___might_sleep+0x163/0x280 [ 456.475727] __should_failslab+0x121/0x190 [ 456.479982] should_failslab+0x9/0x14 [ 456.483794] kmem_cache_alloc_node_trace+0x270/0x720 [ 456.488901] ? kasan_check_read+0x11/0x20 [ 456.493056] ? do_raw_spin_unlock+0x57/0x270 [ 456.497478] __kmalloc_node+0x3d/0x70 [ 456.501291] __vmalloc_node_range+0x201/0x790 [ 456.505809] __vmalloc+0x44/0x50 [ 456.509183] ? pcpu_mem_zalloc+0x8a/0xf0 [ 456.513253] pcpu_mem_zalloc+0x8a/0xf0 [ 456.517151] pcpu_create_chunk+0x119/0x8d0 [ 456.521396] pcpu_alloc+0x1087/0x12e0 [ 456.525219] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 456.530008] __alloc_percpu_gfp+0x28/0x30 [ 456.534161] array_map_alloc+0x506/0x600 [ 456.538231] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 456.543514] __do_sys_bpf+0x88b/0x3c10 [ 456.547415] ? bpf_prog_load+0x1490/0x1490 [ 456.551654] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 456.556506] ? check_preemption_disabled+0x48/0x290 [ 456.561530] ? wait_for_completion+0x440/0x440 [ 456.566125] ? __sb_end_write+0xd9/0x110 [ 456.570198] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 456.575759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 456.580524] ? do_syscall_64+0x26/0x610 [ 456.584508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.589874] ? do_syscall_64+0x26/0x610 [ 456.593861] __x64_sys_bpf+0x73/0xb0 [ 456.597583] do_syscall_64+0x103/0x610 [ 456.601489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.606687] RIP: 0033:0x457e29 [ 456.609887] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.628797] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 456.636517] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 456.643789] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 456.651063] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 456.658338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 456.665608] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 19:37:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 456.754168] IPVS: ftp: loaded support on port[0] = 21 [ 456.766715] IPVS: ftp: loaded support on port[0] = 21 19:37:57 executing program 0 (fault-call:3 fault-nth:16): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 456.802048] protocol 88fb is buggy, dev hsr_slave_0 [ 456.807174] protocol 88fb is buggy, dev hsr_slave_1 [ 456.812359] protocol 88fb is buggy, dev hsr_slave_0 19:37:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:37:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 456.961410] FAULT_INJECTION: forcing a failure. [ 456.961410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 457.004357] CPU: 1 PID: 19251 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 457.011672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.021037] Call Trace: [ 457.023641] dump_stack+0x172/0x1f0 [ 457.027287] should_fail.cold+0xa/0x1b [ 457.031184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 457.036285] ? ___might_sleep+0x163/0x280 [ 457.036308] should_fail_alloc_page+0x50/0x60 [ 457.036322] __alloc_pages_nodemask+0x1a1/0x710 [ 457.036342] ? __alloc_pages_slowpath+0x2900/0x2900 [ 457.036358] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 457.036379] ? kasan_unpoison_shadow+0x35/0x50 [ 457.049654] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 457.049678] alloc_pages_current+0x107/0x210 [ 457.049698] __vmalloc_node_range+0x4b0/0x790 [ 457.064714] __vmalloc+0x44/0x50 [ 457.079104] ? pcpu_mem_zalloc+0x8a/0xf0 [ 457.079121] pcpu_mem_zalloc+0x8a/0xf0 [ 457.079136] pcpu_create_chunk+0x119/0x8d0 [ 457.079153] pcpu_alloc+0x1087/0x12e0 [ 457.090432] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 457.090460] __alloc_percpu_gfp+0x28/0x30 [ 457.098475] array_map_alloc+0x506/0x600 [ 457.098497] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 457.098518] __do_sys_bpf+0x88b/0x3c10 [ 457.107396] ? bpf_prog_load+0x1490/0x1490 [ 457.107414] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 457.107433] ? check_preemption_disabled+0x48/0x290 [ 457.107449] ? wait_for_completion+0x440/0x440 [ 457.116754] ? __sb_end_write+0xd9/0x110 [ 457.116774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 457.116803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 457.116817] ? do_syscall_64+0x26/0x610 [ 457.116833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.163739] ? do_syscall_64+0x26/0x610 [ 457.167736] __x64_sys_bpf+0x73/0xb0 [ 457.171458] do_syscall_64+0x103/0x610 [ 457.175357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.180557] RIP: 0033:0x457e29 [ 457.183757] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:37:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 457.203188] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 457.210910] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 457.210920] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 457.210928] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 457.210937] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 457.210945] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 457.236913] IPVS: ftp: loaded support on port[0] = 21 [ 457.373680] IPVS: ftp: loaded support on port[0] = 21 19:38:00 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:00 executing program 0 (fault-call:3 fault-nth:17): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:00 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x98, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:00 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:00 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x2000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 459.217143] IPVS: ftp: loaded support on port[0] = 21 [ 459.301216] FAULT_INJECTION: forcing a failure. [ 459.301216] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:38:00 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 459.386456] CPU: 1 PID: 19382 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 459.393778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.403139] Call Trace: [ 459.405751] dump_stack+0x172/0x1f0 [ 459.409392] should_fail.cold+0xa/0x1b [ 459.413290] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 459.418402] ? ___might_sleep+0x163/0x280 [ 459.422574] should_fail_alloc_page+0x50/0x60 [ 459.427078] __alloc_pages_nodemask+0x1a1/0x710 [ 459.431767] ? __alloc_pages_slowpath+0x2900/0x2900 [ 459.436791] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 459.442253] ? __lock_is_held+0xb6/0x140 [ 459.446348] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 459.451901] alloc_pages_current+0x107/0x210 [ 459.456328] ? ___might_sleep+0x163/0x280 [ 459.460494] __vmalloc_node_range+0x4b0/0x790 [ 459.465022] __vmalloc+0x44/0x50 [ 459.468399] ? pcpu_mem_zalloc+0x8a/0xf0 [ 459.472466] pcpu_mem_zalloc+0x8a/0xf0 [ 459.476360] pcpu_create_chunk+0x119/0x8d0 [ 459.480603] pcpu_alloc+0x1087/0x12e0 [ 459.484421] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 459.489200] __alloc_percpu_gfp+0x28/0x30 [ 459.493356] array_map_alloc+0x506/0x600 [ 459.497434] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 459.502731] __do_sys_bpf+0x88b/0x3c10 [ 459.506627] ? bpf_prog_load+0x1490/0x1490 [ 459.510871] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 459.515730] ? check_preemption_disabled+0x48/0x290 [ 459.520770] ? wait_for_completion+0x440/0x440 [ 459.525368] ? __sb_end_write+0xd9/0x110 [ 459.529442] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 459.534997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 459.539765] ? do_syscall_64+0x26/0x610 [ 459.543760] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.549134] ? do_syscall_64+0x26/0x610 [ 459.553132] __x64_sys_bpf+0x73/0xb0 [ 459.556854] do_syscall_64+0x103/0x610 [ 459.560762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.565960] RIP: 0033:0x457e29 [ 459.569159] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.588069] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 459.595793] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 459.603071] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 459.610349] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 459.617731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 459.625012] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 459.692593] IPVS: ftp: loaded support on port[0] = 21 [ 459.713260] IPVS: ftp: loaded support on port[0] = 21 19:38:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 460.085312] cgroup: fork rejected by pids controller in /syz2 19:38:01 executing program 0 (fault-call:3 fault-nth:18): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 460.256710] IPVS: ftp: loaded support on port[0] = 21 [ 460.286559] IPVS: ftp: loaded support on port[0] = 21 19:38:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:01 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 460.591605] FAULT_INJECTION: forcing a failure. [ 460.591605] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 460.647899] CPU: 1 PID: 19509 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 460.655307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.664667] Call Trace: [ 460.667271] dump_stack+0x172/0x1f0 [ 460.670913] should_fail.cold+0xa/0x1b [ 460.674809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 460.679921] ? ___might_sleep+0x163/0x280 [ 460.684084] should_fail_alloc_page+0x50/0x60 [ 460.688586] __alloc_pages_nodemask+0x1a1/0x710 [ 460.693282] ? __alloc_pages_slowpath+0x2900/0x2900 [ 460.698304] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 460.703766] ? __lock_is_held+0xb6/0x140 [ 460.707839] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 460.713387] alloc_pages_current+0x107/0x210 [ 460.717811] ? ___might_sleep+0x163/0x280 [ 460.721972] __vmalloc_node_range+0x4b0/0x790 [ 460.726497] __vmalloc+0x44/0x50 [ 460.729872] ? pcpu_mem_zalloc+0x8a/0xf0 [ 460.733940] pcpu_mem_zalloc+0x8a/0xf0 [ 460.737830] pcpu_create_chunk+0x119/0x8d0 [ 460.742072] pcpu_alloc+0x1087/0x12e0 [ 460.745892] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 460.750676] __alloc_percpu_gfp+0x28/0x30 [ 460.754830] array_map_alloc+0x506/0x600 [ 460.758898] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 460.764180] __do_sys_bpf+0x88b/0x3c10 [ 460.768075] ? bpf_prog_load+0x1490/0x1490 [ 460.772311] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 460.777158] ? check_preemption_disabled+0x48/0x290 [ 460.782180] ? wait_for_completion+0x440/0x440 [ 460.786776] ? __sb_end_write+0xd9/0x110 [ 460.790850] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 460.796407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 460.801168] ? do_syscall_64+0x26/0x610 [ 460.805150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.810516] ? do_syscall_64+0x26/0x610 [ 460.814505] __x64_sys_bpf+0x73/0xb0 [ 460.818231] do_syscall_64+0x103/0x610 [ 460.822129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.827317] RIP: 0033:0x457e29 [ 460.830513] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 460.849424] RSP: 002b:00007fd73725ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 460.857151] RAX: ffffffffffffffda RBX: 00007fd73725ac90 RCX: 0000000000457e29 [ 460.864435] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 460.871719] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 460.879001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73725b6d4 [ 460.886280] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000003 [ 461.015959] IPVS: ftp: loaded support on port[0] = 21 19:38:02 executing program 0 (fault-call:3 fault-nth:19): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 461.546325] FAULT_INJECTION: forcing a failure. [ 461.546325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 461.638830] CPU: 0 PID: 19519 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 461.646160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.655524] Call Trace: [ 461.658133] dump_stack+0x172/0x1f0 [ 461.661773] should_fail.cold+0xa/0x1b [ 461.665669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 461.670783] ? ___might_sleep+0x163/0x280 [ 461.674950] should_fail_alloc_page+0x50/0x60 [ 461.679451] __alloc_pages_nodemask+0x1a1/0x710 [ 461.684137] ? __alloc_pages_slowpath+0x2900/0x2900 [ 461.689154] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 461.694616] ? __lock_is_held+0xb6/0x140 [ 461.698690] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 461.704237] alloc_pages_current+0x107/0x210 [ 461.708654] ? ___might_sleep+0x163/0x280 [ 461.712819] __vmalloc_node_range+0x4b0/0x790 [ 461.717333] __vmalloc+0x44/0x50 [ 461.720702] ? pcpu_mem_zalloc+0x8a/0xf0 [ 461.724772] pcpu_mem_zalloc+0x8a/0xf0 [ 461.728664] pcpu_create_chunk+0x119/0x8d0 [ 461.732915] pcpu_alloc+0x1087/0x12e0 [ 461.736733] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 461.741503] __alloc_percpu_gfp+0x28/0x30 [ 461.745658] array_map_alloc+0x506/0x600 [ 461.749725] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 461.755015] __do_sys_bpf+0x88b/0x3c10 [ 461.758922] ? bpf_prog_load+0x1490/0x1490 [ 461.763157] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 461.768009] ? check_preemption_disabled+0x48/0x290 [ 461.773043] ? wait_for_completion+0x440/0x440 [ 461.777634] ? __sb_end_write+0xd9/0x110 [ 461.781702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 461.787255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 461.792020] ? do_syscall_64+0x26/0x610 [ 461.795999] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.804681] ? do_syscall_64+0x26/0x610 [ 461.808681] __x64_sys_bpf+0x73/0xb0 [ 461.812418] do_syscall_64+0x103/0x610 [ 461.816316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.821503] RIP: 0033:0x457e29 [ 461.824709] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 461.843618] RSP: 002b:00007fd737239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 461.851340] RAX: ffffffffffffffda RBX: 00007fd737239c90 RCX: 0000000000457e29 [ 461.858618] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 461.865901] RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 461.873178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73723a6d4 [ 461.880460] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000003 19:38:03 executing program 0 (fault-call:3 fault-nth:20): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 462.488364] FAULT_INJECTION: forcing a failure. [ 462.488364] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 462.561214] CPU: 1 PID: 19523 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 462.568552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.577908] Call Trace: [ 462.580512] dump_stack+0x172/0x1f0 [ 462.584146] should_fail.cold+0xa/0x1b [ 462.588051] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 462.593171] ? ___might_sleep+0x163/0x280 [ 462.597341] should_fail_alloc_page+0x50/0x60 [ 462.601840] __alloc_pages_nodemask+0x1a1/0x710 [ 462.606523] ? __alloc_pages_slowpath+0x2900/0x2900 [ 462.611556] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 462.617017] ? __lock_is_held+0xb6/0x140 [ 462.621084] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 462.626630] alloc_pages_current+0x107/0x210 [ 462.631128] ? ___might_sleep+0x163/0x280 [ 462.635285] __vmalloc_node_range+0x4b0/0x790 [ 462.639799] __vmalloc+0x44/0x50 [ 462.643167] ? pcpu_mem_zalloc+0x8a/0xf0 [ 462.647233] pcpu_mem_zalloc+0x8a/0xf0 [ 462.651121] pcpu_create_chunk+0x119/0x8d0 [ 462.655359] pcpu_alloc+0x1087/0x12e0 [ 462.659174] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 462.663949] __alloc_percpu_gfp+0x28/0x30 [ 462.668101] array_map_alloc+0x506/0x600 [ 462.672168] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 462.677448] __do_sys_bpf+0x88b/0x3c10 [ 462.681347] ? bpf_prog_load+0x1490/0x1490 [ 462.685582] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 462.690430] ? check_preemption_disabled+0x48/0x290 [ 462.695452] ? wait_for_completion+0x440/0x440 [ 462.700045] ? __sb_end_write+0xd9/0x110 [ 462.704115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 462.709665] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 462.714423] ? do_syscall_64+0x26/0x610 [ 462.718404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.723766] ? do_syscall_64+0x26/0x610 [ 462.727749] __x64_sys_bpf+0x73/0xb0 [ 462.731466] do_syscall_64+0x103/0x610 [ 462.735367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.740552] RIP: 0033:0x457e29 [ 462.743746] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.762647] RSP: 002b:00007fd73727bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 462.770356] RAX: ffffffffffffffda RBX: 00007fd73727bc90 RCX: 0000000000457e29 [ 462.777628] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 462.784899] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 462.792171] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73727c6d4 [ 462.799437] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000003 [ 462.806906] net_ratelimit: 24 callbacks suppressed [ 462.806915] protocol 88fb is buggy, dev hsr_slave_0 [ 462.812066] protocol 88fb is buggy, dev hsr_slave_0 [ 462.816924] protocol 88fb is buggy, dev hsr_slave_1 [ 462.821899] protocol 88fb is buggy, dev hsr_slave_1 [ 462.826990] protocol 88fb is buggy, dev hsr_slave_0 [ 462.831987] protocol 88fb is buggy, dev hsr_slave_0 [ 462.836968] protocol 88fb is buggy, dev hsr_slave_1 [ 462.841932] protocol 88fb is buggy, dev hsr_slave_1 19:38:03 executing program 0 (fault-call:3 fault-nth:21): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 463.042067] protocol 88fb is buggy, dev hsr_slave_0 [ 463.047218] protocol 88fb is buggy, dev hsr_slave_1 [ 463.100627] FAULT_INJECTION: forcing a failure. [ 463.100627] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 463.827322] CPU: 1 PID: 19526 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #84 [ 463.834637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.843986] Call Trace: [ 463.846585] dump_stack+0x172/0x1f0 [ 463.850229] should_fail.cold+0xa/0x1b [ 463.854130] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 463.859239] ? ___might_sleep+0x163/0x280 [ 463.863403] should_fail_alloc_page+0x50/0x60 [ 463.867906] __alloc_pages_nodemask+0x1a1/0x710 [ 463.872593] ? __alloc_pages_slowpath+0x2900/0x2900 [ 463.877614] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 463.883072] ? __lock_is_held+0xb6/0x140 [ 463.887141] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 463.892690] alloc_pages_current+0x107/0x210 [ 463.897099] ? ___might_sleep+0x163/0x280 [ 463.901260] __vmalloc_node_range+0x4b0/0x790 [ 463.906378] __vmalloc+0x44/0x50 [ 463.909750] ? pcpu_mem_zalloc+0x8a/0xf0 [ 463.913811] pcpu_mem_zalloc+0x8a/0xf0 [ 463.917702] pcpu_create_chunk+0x119/0x8d0 [ 463.921941] pcpu_alloc+0x1087/0x12e0 [ 463.925754] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 463.930526] __alloc_percpu_gfp+0x28/0x30 [ 463.934682] array_map_alloc+0x506/0x600 [ 463.938749] ? perf_event_fd_array_get_ptr+0x260/0x260 [ 463.944029] __do_sys_bpf+0x88b/0x3c10 [ 463.947923] ? bpf_prog_load+0x1490/0x1490 [ 463.952163] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 463.957009] ? check_preemption_disabled+0x48/0x290 [ 463.962030] ? wait_for_completion+0x440/0x440 [ 463.966618] ? __sb_end_write+0xd9/0x110 [ 463.970687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 463.976246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 463.981003] ? do_syscall_64+0x26/0x610 [ 463.984985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.990348] ? do_syscall_64+0x26/0x610 [ 463.994333] __x64_sys_bpf+0x73/0xb0 [ 463.998052] do_syscall_64+0x103/0x610 [ 464.001951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.007140] RIP: 0033:0x457e29 [ 464.011895] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.031210] RSP: 002b:00007fd73729cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 464.038930] RAX: ffffffffffffffda RBX: 00007fd73729cc90 RCX: 0000000000457e29 [ 464.046197] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 464.053572] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 464.060842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd73729d6d4 [ 464.068108] R13: 00000000004be0cd R14: 00000000004ce6e8 R15: 0000000000000005 [ 464.946070] IPVS: ftp: loaded support on port[0] = 21 [ 465.586502] chnl_net:caif_netlink_parms(): no params data found [ 465.931212] IPVS: ftp: loaded support on port[0] = 21 [ 466.217214] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.224044] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.230948] device bridge_slave_0 entered promiscuous mode [ 466.240905] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.248705] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.256349] device bridge_slave_1 entered promiscuous mode 19:38:07 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x9a, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:07 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x3000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:07 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x0, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 466.274792] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 466.290811] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 466.357102] IPVS: ftp: loaded support on port[0] = 21 [ 466.369330] IPVS: ftp: loaded support on port[0] = 21 [ 466.386301] IPVS: ftp: loaded support on port[0] = 21 [ 466.871880] team0: Port device team_slave_0 added [ 466.930619] team0: Port device team_slave_1 added [ 467.156944] IPVS: ftp: loaded support on port[0] = 21 [ 467.182987] IPVS: ftp: loaded support on port[0] = 21 [ 467.424520] device hsr_slave_0 entered promiscuous mode [ 467.462279] device hsr_slave_1 entered promiscuous mode [ 467.866099] device bridge_slave_1 left promiscuous mode [ 467.883028] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.934238] device bridge_slave_0 left promiscuous mode [ 467.939750] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.022559] device bridge_slave_1 left promiscuous mode [ 468.028080] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.083079] device bridge_slave_0 left promiscuous mode [ 468.088704] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.042053] net_ratelimit: 25 callbacks suppressed [ 469.042061] protocol 88fb is buggy, dev hsr_slave_0 [ 469.042096] protocol 88fb is buggy, dev hsr_slave_1 [ 469.047109] protocol 88fb is buggy, dev hsr_slave_1 [ 469.282088] protocol 88fb is buggy, dev hsr_slave_0 [ 469.287229] protocol 88fb is buggy, dev hsr_slave_1 [ 469.292414] protocol 88fb is buggy, dev hsr_slave_0 [ 469.297478] protocol 88fb is buggy, dev hsr_slave_1 [ 471.122050] protocol 88fb is buggy, dev hsr_slave_0 [ 471.122065] protocol 88fb is buggy, dev hsr_slave_0 [ 471.127143] protocol 88fb is buggy, dev hsr_slave_1 [ 472.897901] device hsr_slave_1 left promiscuous mode [ 472.965407] device hsr_slave_0 left promiscuous mode [ 473.025891] team0 (unregistering): Port device team_slave_1 removed [ 473.037994] team0 (unregistering): Port device team_slave_0 removed [ 473.048931] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 473.088652] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 473.185594] bond0 (unregistering): Released all slaves [ 473.355359] device hsr_slave_1 left promiscuous mode [ 473.397515] device hsr_slave_0 left promiscuous mode [ 473.455683] team0 (unregistering): Port device team_slave_1 removed [ 473.468952] team0 (unregistering): Port device team_slave_0 removed [ 473.479354] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 473.516503] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 473.606433] bond0 (unregistering): Released all slaves [ 473.727266] chnl_net:caif_netlink_parms(): no params data found [ 473.841489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 473.870427] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.877779] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.889596] device bridge_slave_0 entered promiscuous mode [ 473.901380] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.915413] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.925913] device bridge_slave_1 entered promiscuous mode [ 473.948474] 8021q: adding VLAN 0 to HW filter on device team0 [ 473.958488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 473.967108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 474.040184] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 474.058189] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 474.074170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 474.096391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 474.111138] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.117533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.125273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 474.133513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 474.141305] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.147713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.155133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 474.163454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 474.171140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 474.179535] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 474.213050] team0: Port device team_slave_0 added [ 474.259817] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 474.282008] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 474.313160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 474.328095] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 474.372759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 474.392857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 474.400609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 474.415838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 474.423955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 474.431534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 474.440489] team0: Port device team_slave_1 added [ 474.446744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 474.532110] net_ratelimit: 13 callbacks suppressed [ 474.532118] protocol 88fb is buggy, dev hsr_slave_0 [ 474.542181] protocol 88fb is buggy, dev hsr_slave_1 [ 474.560055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 474.652094] protocol 88fb is buggy, dev hsr_slave_0 [ 474.657191] protocol 88fb is buggy, dev hsr_slave_1 [ 474.772443] protocol 88fb is buggy, dev hsr_slave_0 [ 474.778026] protocol 88fb is buggy, dev hsr_slave_1 [ 474.889884] device hsr_slave_0 entered promiscuous mode [ 474.895813] protocol 88fb is buggy, dev hsr_slave_0 [ 474.896023] protocol 88fb is buggy, dev hsr_slave_1 [ 474.958628] device hsr_slave_1 entered promiscuous mode [ 475.177662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 475.217954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 475.225885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 475.235641] 8021q: adding VLAN 0 to HW filter on device team0 [ 475.254773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 475.263415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 475.271064] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.277466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.284646] protocol 88fb is buggy, dev hsr_slave_0 [ 475.289712] protocol 88fb is buggy, dev hsr_slave_1 [ 475.357845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 475.372510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 475.380428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 475.402754] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.409133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.432310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 475.440316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 475.462792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 475.470734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 475.493041] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 475.551664] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 475.602504] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 475.627026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 475.647335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 475.678751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 475.718582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 19:38:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:16 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xba, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 475.726798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 475.744775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 475.768128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 475.787129] IPVS: ftp: loaded support on port[0] = 21 [ 475.810068] 8021q: adding VLAN 0 to HW filter on device batadv0 19:38:16 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x4000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x3, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 476.036330] IPVS: ftp: loaded support on port[0] = 21 19:38:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 476.618440] IPVS: ftp: loaded support on port[0] = 21 [ 476.804844] IPVS: ftp: loaded support on port[0] = 21 19:38:17 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x0, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x5, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:17 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xc8, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 477.024004] IPVS: ftp: loaded support on port[0] = 21 [ 477.094527] IPVS: ftp: loaded support on port[0] = 21 [ 477.627368] IPVS: ftp: loaded support on port[0] = 21 19:38:20 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x5000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:20 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x0, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:20 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xec, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 479.294421] IPVS: ftp: loaded support on port[0] = 21 [ 479.319176] IPVS: ftp: loaded support on port[0] = 21 19:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 479.384691] IPVS: ftp: loaded support on port[0] = 21 19:38:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x7, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 479.682069] net_ratelimit: 32 callbacks suppressed [ 479.682077] protocol 88fb is buggy, dev hsr_slave_0 [ 479.692216] protocol 88fb is buggy, dev hsr_slave_1 [ 479.697356] protocol 88fb is buggy, dev hsr_slave_0 [ 479.702460] protocol 88fb is buggy, dev hsr_slave_1 [ 480.235056] IPVS: ftp: loaded support on port[0] = 21 [ 480.268419] IPVS: ftp: loaded support on port[0] = 21 [ 480.332055] protocol 88fb is buggy, dev hsr_slave_0 [ 480.337216] protocol 88fb is buggy, dev hsr_slave_1 [ 481.122038] protocol 88fb is buggy, dev hsr_slave_0 [ 481.127154] protocol 88fb is buggy, dev hsr_slave_1 [ 481.522062] protocol 88fb is buggy, dev hsr_slave_0 [ 481.527271] protocol 88fb is buggy, dev hsr_slave_1 19:38:24 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x11000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:24 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x9, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:24 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:24 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x10c, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 483.713582] IPVS: ftp: loaded support on port[0] = 21 19:38:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, 0x0, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 483.747767] IPVS: ftp: loaded support on port[0] = 21 19:38:24 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:24 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xb, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, 0x0, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 484.370250] IPVS: ftp: loaded support on port[0] = 21 [ 484.479156] IPVS: ftp: loaded support on port[0] = 21 19:38:25 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1d000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, 0x0, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:25 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 484.705211] IPVS: ftp: loaded support on port[0] = 21 19:38:25 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x130, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xd, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 484.914844] IPVS: ftp: loaded support on port[0] = 21 19:38:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 485.282058] net_ratelimit: 20 callbacks suppressed [ 485.282067] protocol 88fb is buggy, dev hsr_slave_0 [ 485.292192] protocol 88fb is buggy, dev hsr_slave_1 [ 485.479751] IPVS: ftp: loaded support on port[0] = 21 [ 485.536212] IPVS: ftp: loaded support on port[0] = 21 [ 485.682059] protocol 88fb is buggy, dev hsr_slave_0 [ 485.682064] protocol 88fb is buggy, dev hsr_slave_0 [ 485.687164] protocol 88fb is buggy, dev hsr_slave_1 [ 485.692223] protocol 88fb is buggy, dev hsr_slave_1 [ 485.922043] protocol 88fb is buggy, dev hsr_slave_0 [ 485.927193] protocol 88fb is buggy, dev hsr_slave_1 [ 485.932342] protocol 88fb is buggy, dev hsr_slave_0 [ 485.937396] protocol 88fb is buggy, dev hsr_slave_1 19:38:28 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x30010000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xf, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:28 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 488.067994] IPVS: ftp: loaded support on port[0] = 21 19:38:29 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x174, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x10, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:29 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 488.596588] IPVS: ftp: loaded support on port[0] = 21 19:38:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 488.735132] IPVS: ftp: loaded support on port[0] = 21 [ 488.735684] IPVS: ftp: loaded support on port[0] = 21 19:38:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x11, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 489.268945] IPVS: ftp: loaded support on port[0] = 21 [ 490.722040] net_ratelimit: 22 callbacks suppressed [ 490.722049] protocol 88fb is buggy, dev hsr_slave_0 [ 490.732148] protocol 88fb is buggy, dev hsr_slave_1 19:38:32 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x40000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x12, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:32 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 491.436743] IPVS: ftp: loaded support on port[0] = 21 [ 491.516514] IPVS: ftp: loaded support on port[0] = 21 [ 491.532093] protocol 88fb is buggy, dev hsr_slave_0 [ 491.537244] protocol 88fb is buggy, dev hsr_slave_1 [ 491.832541] IPVS: ftp: loaded support on port[0] = 21 [ 491.922033] protocol 88fb is buggy, dev hsr_slave_0 [ 491.922062] protocol 88fb is buggy, dev hsr_slave_0 [ 491.927148] protocol 88fb is buggy, dev hsr_slave_1 [ 491.932176] protocol 88fb is buggy, dev hsr_slave_1 [ 492.162046] protocol 88fb is buggy, dev hsr_slave_0 [ 492.167165] protocol 88fb is buggy, dev hsr_slave_1 19:38:33 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x175, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:33 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:33 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x13, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:33 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x60020000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 492.279813] IPVS: ftp: loaded support on port[0] = 21 19:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 492.314118] IPVS: ftp: loaded support on port[0] = 21 [ 492.347565] IPVS: ftp: loaded support on port[0] = 21 19:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x14, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x15, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:33 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 493.025149] IPVS: ftp: loaded support on port[0] = 21 19:38:34 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x18a, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:34 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:34 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 493.123394] IPVS: ftp: loaded support on port[0] = 21 19:38:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x18, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 493.238494] IPVS: ftp: loaded support on port[0] = 21 [ 493.287457] IPVS: ftp: loaded support on port[0] = 21 [ 493.597864] IPVS: ftp: loaded support on port[0] = 21 19:38:36 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x62000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x28, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:36 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:36 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1e4, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x48, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 495.648695] IPVS: ftp: loaded support on port[0] = 21 [ 495.655368] IPVS: ftp: loaded support on port[0] = 21 [ 495.675868] IPVS: ftp: loaded support on port[0] = 21 19:38:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 496.082050] net_ratelimit: 18 callbacks suppressed [ 496.082057] protocol 88fb is buggy, dev hsr_slave_0 [ 496.082099] protocol 88fb is buggy, dev hsr_slave_1 [ 496.087145] protocol 88fb is buggy, dev hsr_slave_1 [ 496.322078] protocol 88fb is buggy, dev hsr_slave_0 [ 496.327183] protocol 88fb is buggy, dev hsr_slave_1 [ 496.332331] protocol 88fb is buggy, dev hsr_slave_0 [ 496.337392] protocol 88fb is buggy, dev hsr_slave_1 [ 496.395657] IPVS: ftp: loaded support on port[0] = 21 [ 496.419786] IPVS: ftp: loaded support on port[0] = 21 [ 496.962048] protocol 88fb is buggy, dev hsr_slave_0 [ 496.967144] protocol 88fb is buggy, dev hsr_slave_1 [ 497.762066] protocol 88fb is buggy, dev hsr_slave_0 19:38:39 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x64000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:39 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x68, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 498.579241] IPVS: ftp: loaded support on port[0] = 21 [ 498.582547] IPVS: ftp: loaded support on port[0] = 21 19:38:40 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x20a, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:40 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 499.267106] IPVS: ftp: loaded support on port[0] = 21 19:38:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x88, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 499.309190] IPVS: ftp: loaded support on port[0] = 21 [ 499.373712] IPVS: ftp: loaded support on port[0] = 21 [ 500.036984] IPVS: ftp: loaded support on port[0] = 21 [ 501.123099] net_ratelimit: 21 callbacks suppressed [ 501.123108] protocol 88fb is buggy, dev hsr_slave_0 [ 501.133183] protocol 88fb is buggy, dev hsr_slave_1 [ 501.922059] protocol 88fb is buggy, dev hsr_slave_0 [ 501.927165] protocol 88fb is buggy, dev hsr_slave_1 [ 502.220884] IPVS: ftp: loaded support on port[0] = 21 19:38:43 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x82020000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:43 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:43 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8c, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:43 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x24a, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 502.321287] IPVS: ftp: loaded support on port[0] = 21 [ 502.322060] protocol 88fb is buggy, dev hsr_slave_0 [ 502.326613] protocol 88fb is buggy, dev hsr_slave_0 [ 502.331682] protocol 88fb is buggy, dev hsr_slave_1 [ 502.336682] protocol 88fb is buggy, dev hsr_slave_1 [ 502.353091] IPVS: ftp: loaded support on port[0] = 21 19:38:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa8, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 502.395829] IPVS: ftp: loaded support on port[0] = 21 [ 502.562058] protocol 88fb is buggy, dev hsr_slave_0 [ 502.567173] protocol 88fb is buggy, dev hsr_slave_1 19:38:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xac, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:43 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 502.625684] chnl_net:caif_netlink_parms(): no params data found 19:38:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc8, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:43 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 502.921896] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.956757] bridge0: port 1(bridge_slave_0) entered disabled state [ 502.979222] device bridge_slave_0 entered promiscuous mode [ 503.164927] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.172530] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.179787] device bridge_slave_1 entered promiscuous mode [ 503.204677] IPVS: ftp: loaded support on port[0] = 21 [ 503.211739] IPVS: ftp: loaded support on port[0] = 21 [ 503.351299] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 503.422967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 503.459783] team0: Port device team_slave_0 added [ 503.528919] team0: Port device team_slave_1 added [ 503.613944] device hsr_slave_0 entered promiscuous mode [ 503.652340] device hsr_slave_1 entered promiscuous mode [ 503.710789] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.717212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 503.723892] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.730242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 503.749217] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.756741] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.888347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 503.900266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 503.908188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 503.918180] 8021q: adding VLAN 0 to HW filter on device team0 [ 503.931637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 503.941429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 503.949624] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.956016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.013944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 504.033258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 504.040951] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.047341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 504.055251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 504.063698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 504.081432] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 504.092651] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 504.116388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 504.117041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 504.142988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 504.151205] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 504.159290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 504.167060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 504.174924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 504.183155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 504.242661] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 504.249797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 504.373369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 504.537862] device bridge_slave_1 left promiscuous mode [ 504.548077] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.712435] device bridge_slave_0 left promiscuous mode [ 504.717946] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.985329] device hsr_slave_1 left promiscuous mode [ 505.049877] device hsr_slave_0 left promiscuous mode [ 505.109325] team0 (unregistering): Port device team_slave_1 removed [ 505.136711] team0 (unregistering): Port device team_slave_0 removed [ 505.163805] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 505.229401] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 505.426852] bond0 (unregistering): Released all slaves 19:38:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xcc, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 506.482158] net_ratelimit: 24 callbacks suppressed [ 506.482166] protocol 88fb is buggy, dev hsr_slave_0 [ 506.482338] protocol 88fb is buggy, dev hsr_slave_0 [ 506.487190] protocol 88fb is buggy, dev hsr_slave_1 [ 506.492216] protocol 88fb is buggy, dev hsr_slave_1 [ 506.642492] protocol 88fb is buggy, dev hsr_slave_0 [ 506.647583] protocol 88fb is buggy, dev hsr_slave_1 [ 506.722042] protocol 88fb is buggy, dev hsr_slave_0 [ 506.727171] protocol 88fb is buggy, dev hsr_slave_1 [ 506.732351] protocol 88fb is buggy, dev hsr_slave_0 [ 506.737394] protocol 88fb is buggy, dev hsr_slave_1 19:38:47 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x88000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:47 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe8, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:47 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:38:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:47 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x262, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 507.017102] IPVS: ftp: loaded support on port[0] = 21 [ 507.038443] IPVS: ftp: loaded support on port[0] = 21 [ 507.048823] IPVS: ftp: loaded support on port[0] = 21 19:38:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xec, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:48 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:48 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x500, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:48 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 507.850235] IPVS: ftp: loaded support on port[0] = 21 [ 508.005904] IPVS: ftp: loaded support on port[0] = 21 19:38:49 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x98000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x600, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefffffffffffff41}) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000140)=""/109, 0x6d) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000080)) 19:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:49 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x282, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:49 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000300)) [ 508.359140] IPVS: ftp: loaded support on port[0] = 21 [ 508.375182] IPVS: ftp: loaded support on port[0] = 21 19:38:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x700, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 508.409156] IPVS: ftp: loaded support on port[0] = 21 19:38:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x900, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 509.272817] IPVS: ftp: loaded support on port[0] = 21 [ 509.331793] IPVS: ftp: loaded support on port[0] = 21 19:38:52 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x9effffff, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xb00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:52 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe82) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) 19:38:52 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000300)) 19:38:52 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2dc, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 511.648165] IPVS: ftp: loaded support on port[0] = 21 [ 511.657238] IPVS: ftp: loaded support on port[0] = 21 [ 511.678325] IPVS: ftp: loaded support on port[0] = 21 19:38:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xd00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 512.322051] net_ratelimit: 24 callbacks suppressed [ 512.322061] protocol 88fb is buggy, dev hsr_slave_0 [ 512.332230] protocol 88fb is buggy, dev hsr_slave_1 [ 512.370041] IPVS: ftp: loaded support on port[0] = 21 [ 512.520671] IPVS: ftp: loaded support on port[0] = 21 [ 512.722095] protocol 88fb is buggy, dev hsr_slave_0 [ 512.722130] protocol 88fb is buggy, dev hsr_slave_1 [ 512.727291] protocol 88fb is buggy, dev hsr_slave_1 [ 512.882051] protocol 88fb is buggy, dev hsr_slave_0 [ 512.887181] protocol 88fb is buggy, dev hsr_slave_1 [ 512.962038] protocol 88fb is buggy, dev hsr_slave_0 [ 512.967194] protocol 88fb is buggy, dev hsr_slave_1 [ 512.972351] protocol 88fb is buggy, dev hsr_slave_0 19:38:55 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xa6000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, 0x0, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:55 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000300)) 19:38:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x200000000000001, 0x0) setsockopt$inet_buf(r0, 0x0, 0x100000021, 0x0, 0x0) shmat(0x0, &(0x7f00000b4000/0x3000)=nil, 0x0) 19:38:55 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x300, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 514.697207] IPVS: ftp: loaded support on port[0] = 21 [ 514.735268] IPVS: ftp: loaded support on port[0] = 21 [ 514.780225] IPVS: ftp: loaded support on port[0] = 21 19:38:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000380)={0x1f, {0x0, 0x0, 0x1609}}, 0xa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:38:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xf00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, 0x0, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, 0x0, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:56 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/sockstat6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 515.568953] IPVS: ftp: loaded support on port[0] = 21 [ 515.662545] IPVS: ftp: loaded support on port[0] = 21 19:38:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:38:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000140)="420fb507b805000000b98de92d630f01c1f2430f3566b869008ec0f0814b00ec480000470f017a00f3f7e4470f017cc0423e26460f21f6410f01df", 0x3b}], 0x1, 0x0, &(0x7f0000000000), 0x101) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 19:38:59 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, 0x0) 19:38:59 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xc8010000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:38:59 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x33c, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:38:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 518.408315] IPVS: ftp: loaded support on port[0] = 21 [ 518.418778] IPVS: ftp: loaded support on port[0] = 21 19:38:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 518.475465] IPVS: ftp: loaded support on port[0] = 21 19:38:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 518.562043] net_ratelimit: 24 callbacks suppressed [ 518.562051] protocol 88fb is buggy, dev hsr_slave_0 [ 518.567076] protocol 88fb is buggy, dev hsr_slave_1 19:38:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1400, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:38:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1500, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 518.962066] protocol 88fb is buggy, dev hsr_slave_0 [ 518.962108] protocol 88fb is buggy, dev hsr_slave_1 [ 518.967148] protocol 88fb is buggy, dev hsr_slave_1 19:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 519.122051] protocol 88fb is buggy, dev hsr_slave_0 [ 519.127317] protocol 88fb is buggy, dev hsr_slave_1 19:39:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 519.202408] protocol 88fb is buggy, dev hsr_slave_0 [ 519.207673] protocol 88fb is buggy, dev hsr_slave_1 [ 519.213618] protocol 88fb is buggy, dev hsr_slave_0 19:39:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 519.550813] IPVS: ftp: loaded support on port[0] = 21 [ 519.569233] IPVS: ftp: loaded support on port[0] = 21 19:39:00 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, 0x0) [ 519.770527] IPVS: ftp: loaded support on port[0] = 21 19:39:00 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xdc010000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 519.876876] IPVS: ftp: loaded support on port[0] = 21 [ 520.320869] IPVS: ftp: loaded support on port[0] = 21 19:39:02 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x35a, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:02 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xffffff9e, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:02 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, 0x0) 19:39:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 521.793212] IPVS: ftp: loaded support on port[0] = 21 [ 521.836649] IPVS: ftp: loaded support on port[0] = 21 [ 521.850161] IPVS: ftp: loaded support on port[0] = 21 19:39:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x3f00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 522.585259] IPVS: ftp: loaded support on port[0] = 21 [ 522.690235] IPVS: ftp: loaded support on port[0] = 21 [ 524.802072] net_ratelimit: 25 callbacks suppressed [ 524.802080] protocol 88fb is buggy, dev hsr_slave_0 [ 524.812165] protocol 88fb is buggy, dev hsr_slave_1 [ 525.202069] protocol 88fb is buggy, dev hsr_slave_0 [ 525.202106] protocol 88fb is buggy, dev hsr_slave_1 [ 525.207186] protocol 88fb is buggy, dev hsr_slave_1 [ 525.362048] protocol 88fb is buggy, dev hsr_slave_0 [ 525.367150] protocol 88fb is buggy, dev hsr_slave_1 [ 525.442051] protocol 88fb is buggy, dev hsr_slave_0 [ 525.447160] protocol 88fb is buggy, dev hsr_slave_1 [ 525.452329] protocol 88fb is buggy, dev hsr_slave_0 [ 525.657772] IPVS: ftp: loaded support on port[0] = 21 [ 525.858704] chnl_net:caif_netlink_parms(): no params data found [ 525.964274] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.970713] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.983075] device bridge_slave_0 entered promiscuous mode [ 525.991428] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.002171] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.009319] device bridge_slave_1 entered promiscuous mode [ 526.096205] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 526.125029] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 526.198800] team0: Port device team_slave_0 added [ 526.231242] team0: Port device team_slave_1 added [ 526.324627] device hsr_slave_0 entered promiscuous mode [ 526.362335] device hsr_slave_1 entered promiscuous mode [ 526.420568] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.427003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.433692] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.440048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.621842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 526.656853] IPVS: ftp: loaded support on port[0] = 21 [ 526.666259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 526.702755] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.719977] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.742685] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 526.768076] 8021q: adding VLAN 0 to HW filter on device team0 [ 526.803570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 526.832531] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.838914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.867579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 526.892753] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.899140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.986145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 527.012516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 527.020626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 527.095970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 527.111309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 527.142673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 527.150283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 527.177393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 527.188301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 527.206562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 527.284129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 527.296953] chnl_net:caif_netlink_parms(): no params data found [ 527.423716] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.445619] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.473065] device bridge_slave_0 entered promiscuous mode [ 527.482328] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.488745] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.512779] device bridge_slave_1 entered promiscuous mode [ 527.538347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 527.559562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 527.614980] team0: Port device team_slave_0 added [ 527.621268] team0: Port device team_slave_1 added [ 527.704573] device hsr_slave_0 entered promiscuous mode [ 527.732326] device hsr_slave_1 entered promiscuous mode [ 527.790962] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.797380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.804023] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.810368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 527.921275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 527.951263] 8021q: adding VLAN 0 to HW filter on device team0 [ 527.958015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 527.974710] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.992436] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.032512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 528.053321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 528.061013] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.067422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.092331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 528.100266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 528.122406] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.128779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.152302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 528.160282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 528.179164] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 528.190402] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 528.202320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 528.210118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 528.218304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 528.226504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 528.234627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 528.242320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 528.249833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 528.257391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 528.265400] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 528.272538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 528.295164] 8021q: adding VLAN 0 to HW filter on device batadv0 19:39:09 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3cf, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:09 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x8000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 528.984017] IPVS: ftp: loaded support on port[0] = 21 19:39:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 529.086399] IPVS: ftp: loaded support on port[0] = 21 19:39:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 529.807834] IPVS: ftp: loaded support on port[0] = 21 [ 530.145858] IPVS: ftp: loaded support on port[0] = 21 19:39:11 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3e6, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:11 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:11 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:11 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x4000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 530.411109] IPVS: ftp: loaded support on port[0] = 21 [ 530.430841] IPVS: ftp: loaded support on port[0] = 21 19:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 530.722052] net_ratelimit: 40 callbacks suppressed [ 530.722059] protocol 88fb is buggy, dev hsr_slave_0 [ 530.732180] protocol 88fb is buggy, dev hsr_slave_1 [ 531.042058] protocol 88fb is buggy, dev hsr_slave_0 [ 531.047175] protocol 88fb is buggy, dev hsr_slave_1 [ 531.142967] IPVS: ftp: loaded support on port[0] = 21 [ 531.176580] IPVS: ftp: loaded support on port[0] = 21 [ 531.442034] protocol 88fb is buggy, dev hsr_slave_0 [ 531.442039] protocol 88fb is buggy, dev hsr_slave_0 [ 531.442082] protocol 88fb is buggy, dev hsr_slave_1 [ 531.447138] protocol 88fb is buggy, dev hsr_slave_1 [ 531.602038] protocol 88fb is buggy, dev hsr_slave_0 [ 531.607209] protocol 88fb is buggy, dev hsr_slave_1 [ 532.234462] device bridge_slave_1 left promiscuous mode [ 532.239994] bridge0: port 2(bridge_slave_1) entered disabled state [ 532.298293] device bridge_slave_0 left promiscuous mode [ 532.312167] bridge0: port 1(bridge_slave_0) entered disabled state [ 532.358499] device bridge_slave_1 left promiscuous mode [ 532.372099] bridge0: port 2(bridge_slave_1) entered disabled state [ 532.417693] device bridge_slave_0 left promiscuous mode [ 532.423644] bridge0: port 1(bridge_slave_0) entered disabled state [ 532.745055] device hsr_slave_1 left promiscuous mode [ 532.787862] device hsr_slave_0 left promiscuous mode [ 532.837011] team0 (unregistering): Port device team_slave_1 removed [ 532.867129] team0 (unregistering): Port device team_slave_0 removed [ 532.912243] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 532.961696] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 533.091665] bond0 (unregistering): Released all slaves [ 533.206068] device hsr_slave_1 left promiscuous mode [ 533.268310] device hsr_slave_0 left promiscuous mode [ 533.328780] team0 (unregistering): Port device team_slave_1 removed [ 533.339409] team0 (unregistering): Port device team_slave_0 removed [ 533.351488] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 533.377145] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 533.458048] bond0 (unregistering): Released all slaves 19:39:14 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3ec, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:15 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x100000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:15 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:15 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 534.254639] IPVS: ftp: loaded support on port[0] = 21 [ 534.275934] IPVS: ftp: loaded support on port[0] = 21 19:39:15 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xac00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 534.860308] IPVS: ftp: loaded support on port[0] = 21 [ 534.967955] IPVS: ftp: loaded support on port[0] = 21 19:39:16 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3ee, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 535.249883] IPVS: ftp: loaded support on port[0] = 21 19:39:16 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x200000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:16 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff"], 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(0x0, 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xcc00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 535.436687] IPVS: ftp: loaded support on port[0] = 21 19:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 535.842034] net_ratelimit: 22 callbacks suppressed [ 535.842043] protocol 88fb is buggy, dev hsr_slave_0 [ 535.852188] protocol 88fb is buggy, dev hsr_slave_1 [ 535.857326] protocol 88fb is buggy, dev hsr_slave_0 [ 535.862432] protocol 88fb is buggy, dev hsr_slave_1 [ 535.922082] protocol 88fb is buggy, dev hsr_slave_0 [ 535.927222] protocol 88fb is buggy, dev hsr_slave_1 [ 535.947799] IPVS: ftp: loaded support on port[0] = 21 19:39:16 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3f2, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 536.168199] IPVS: ftp: loaded support on port[0] = 21 [ 536.186546] IPVS: ftp: loaded support on port[0] = 21 19:39:17 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x300000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xec00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x10800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:17 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 536.640904] IPVS: ftp: loaded support on port[0] = 21 [ 536.920343] IPVS: ftp: loaded support on port[0] = 21 [ 536.962223] protocol 88fb is buggy, dev hsr_slave_0 [ 536.967331] protocol 88fb is buggy, dev hsr_slave_1 19:39:18 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3fa, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:18 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:18 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 537.211735] IPVS: ftp: loaded support on port[0] = 21 [ 537.286871] IPVS: ftp: loaded support on port[0] = 21 19:39:18 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x400000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x10c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:18 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:18 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x12800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:18 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 537.614045] IPVS: ftp: loaded support on port[0] = 21 [ 537.682070] protocol 88fb is buggy, dev hsr_slave_0 [ 537.682396] protocol 88fb is buggy, dev hsr_slave_0 19:39:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 537.934501] IPVS: ftp: loaded support on port[0] = 21 19:39:19 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xa02, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x12c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 538.285902] IPVS: ftp: loaded support on port[0] = 21 19:39:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x14800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 538.503379] IPVS: ftp: loaded support on port[0] = 21 19:39:19 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x500000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x14c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x16800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 538.853712] IPVS: ftp: loaded support on port[0] = 21 19:39:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 538.995619] IPVS: ftp: loaded support on port[0] = 21 19:39:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x16c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) [ 539.618654] IPVS: ftp: loaded support on port[0] = 21 19:39:21 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xc01, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) 19:39:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 19:39:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x18800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:21 executing program 4 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:21 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1100000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 540.904197] IPVS: ftp: loaded support on port[0] = 21 19:39:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x18c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 540.960577] FAULT_INJECTION: forcing a failure. [ 540.960577] name failslab, interval 1, probability 0, space 0, times 0 [ 540.996213] IPVS: ftp: loaded support on port[0] = 21 [ 541.012098] CPU: 1 PID: 21364 Comm: syz-executor.4 Not tainted 5.0.0-rc7+ #84 [ 541.019398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.028745] Call Trace: [ 541.031325] dump_stack+0x172/0x1f0 [ 541.034945] should_fail.cold+0xa/0x1b [ 541.038823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 541.043915] ? lock_downgrade+0x810/0x810 [ 541.048053] ? ___might_sleep+0x163/0x280 [ 541.052194] __should_failslab+0x121/0x190 [ 541.056422] should_failslab+0x9/0x14 [ 541.060212] kmem_cache_alloc+0x2b2/0x6f0 [ 541.064348] ? ksys_write+0x166/0x1f0 [ 541.068199] getname_flags+0xd6/0x5b0 [ 541.071994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.077349] getname+0x1a/0x20 [ 541.080528] __x64_sys_execve+0x73/0xc0 [ 541.084496] do_syscall_64+0x103/0x610 [ 541.088373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.093551] RIP: 0033:0x457e29 [ 541.096731] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.115621] RSP: 002b:00007f5ea59fac78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 541.123320] RAX: ffffffffffffffda RBX: 00007f5ea59fac90 RCX: 0000000000457e29 [ 541.130584] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 541.137844] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 541.145102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ea59fb6d4 [ 541.152356] R13: 00000000004be413 R14: 00000000004ced00 R15: 0000000000000004 [ 541.162127] net_ratelimit: 20 callbacks suppressed [ 541.162135] protocol 88fb is buggy, dev hsr_slave_0 [ 541.162722] cgroup: fork rejected by pids controller in /syz5 [ 541.167147] protocol 88fb is buggy, dev hsr_slave_1 19:39:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1a800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:22 executing program 5 (fault-call:5 fault-nth:0): r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 541.662279] IPVS: ftp: loaded support on port[0] = 21 19:39:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1ac00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 541.734818] IPVS: ftp: loaded support on port[0] = 21 19:39:22 executing program 4 (fault-call:8 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 541.842073] protocol 88fb is buggy, dev hsr_slave_0 [ 541.842078] protocol 88fb is buggy, dev hsr_slave_0 [ 541.842122] protocol 88fb is buggy, dev hsr_slave_1 [ 541.847207] protocol 88fb is buggy, dev hsr_slave_1 [ 541.957128] IPVS: ftp: loaded support on port[0] = 21 [ 542.082835] protocol 88fb is buggy, dev hsr_slave_0 [ 542.087956] protocol 88fb is buggy, dev hsr_slave_1 [ 542.093104] protocol 88fb is buggy, dev hsr_slave_0 [ 542.098157] protocol 88fb is buggy, dev hsr_slave_1 19:39:25 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1100, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:25 executing program 2 (fault-call:9 fault-nth:0): socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1c800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:25 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 544.573466] FAULT_INJECTION: forcing a failure. [ 544.573466] name failslab, interval 1, probability 0, space 0, times 0 [ 544.593667] IPVS: ftp: loaded support on port[0] = 21 [ 544.620825] IPVS: ftp: loaded support on port[0] = 21 [ 544.679522] CPU: 0 PID: 21522 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 544.686861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.696218] Call Trace: [ 544.698819] dump_stack+0x172/0x1f0 [ 544.702463] should_fail.cold+0xa/0x1b [ 544.706350] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 544.711461] ? lock_downgrade+0x810/0x810 [ 544.715629] ? ___might_sleep+0x163/0x280 [ 544.719789] __should_failslab+0x121/0x190 [ 544.724145] should_failslab+0x9/0x14 [ 544.727959] kmem_cache_alloc+0x2b2/0x6f0 [ 544.732115] ? ksys_write+0x166/0x1f0 [ 544.735928] getname_flags+0xd6/0x5b0 [ 544.739735] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.745107] getname+0x1a/0x20 [ 544.748304] __x64_sys_execve+0x73/0xc0 [ 544.752290] do_syscall_64+0x103/0x610 [ 544.756191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.761381] RIP: 0033:0x457e29 [ 544.764575] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 544.783481] RSP: 002b:00007f2ba4544c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 544.791201] RAX: ffffffffffffffda RBX: 00007f2ba4544c90 RCX: 0000000000457e29 [ 544.798487] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 544.805765] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 544.813139] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2ba45456d4 [ 544.820419] R13: 00000000004be413 R14: 00000000004ced00 R15: 0000000000000004 19:39:25 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x1d00000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) lseek(r0, 0x0, 0x3) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r1, 0x2, 0x1) 19:39:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1cc00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 544.994477] IPVS: ftp: loaded support on port[0] = 21 19:39:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000004c0)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f00000007c0)=[0xee01, 0x0, 0xee00, 0xee01]) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x1}, [{0x2, 0x2, r1}, {0x2, 0x5, r2}, {0x2, 0x3, r3}, {0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x2, r6}, {0x2, 0x5, r7}], {0x4, 0x2}, [{0x8, 0x6, r8}], {0x10, 0x4}, {0x20, 0x4}}, 0x64, 0x1) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r9, &(0x7f0000000040)=ANY=[@ANYBLOB="3e5acd4625a0e1b37101c78bf322f70000"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1e800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1ec00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:26 executing program 2 (fault-call:9 fault-nth:1): socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 545.566640] IPVS: ftp: loaded support on port[0] = 21 [ 545.580037] FAULT_INJECTION: forcing a failure. [ 545.580037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 545.591870] CPU: 1 PID: 21601 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #84 [ 545.591878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.591883] Call Trace: [ 545.591904] dump_stack+0x172/0x1f0 [ 545.591923] should_fail.cold+0xa/0x1b [ 545.618602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.623711] ? debug_smp_processor_id+0x1c/0x20 [ 545.628382] ? perf_trace_lock+0xeb/0x510 [ 545.632528] ? mark_held_locks+0x100/0x100 [ 545.636781] should_fail_alloc_page+0x50/0x60 [ 545.641276] __alloc_pages_nodemask+0x1a1/0x710 [ 545.645960] ? __alloc_pages_slowpath+0x2900/0x2900 [ 545.650979] ? find_held_lock+0x35/0x130 [ 545.655057] cache_grow_begin+0x9c/0x8c0 [ 545.659115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.664660] ? check_preemption_disabled+0x48/0x290 [ 545.669687] kmem_cache_alloc+0x62d/0x6f0 [ 545.669705] ? ksys_write+0x166/0x1f0 [ 545.677643] getname_flags+0xd6/0x5b0 [ 545.681455] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.686828] getname+0x1a/0x20 [ 545.690038] __x64_sys_execve+0x73/0xc0 [ 545.694026] do_syscall_64+0x103/0x610 [ 545.697919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.703101] RIP: 0033:0x457e29 [ 545.703116] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.703123] RSP: 002b:00007f2ba4544c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 545.703137] RAX: ffffffffffffffda RBX: 00007f2ba4544c90 RCX: 0000000000457e29 [ 545.703144] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 545.703152] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 545.703163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2ba45456d4 [ 545.747447] R13: 00000000004be413 R14: 00000000004ced00 R15: 0000000000000004 [ 545.767779] IPVS: ftp: loaded support on port[0] = 21 19:39:26 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1d00, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:26 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x11, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:39:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x7) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2279c54555ea04a8966143ad83e23a7c31e7ad8a3ead4fb9788ef3255f678080d441f0f6bbdbf61ccbff3a2bfb0d58200163bbc5b10252e18f3edbf4c2f9dcc053b0bfcc871170049b5937d1f5b9f006f0d0781859d46facf5dc25c8cd7502a9e1105034b28d2da599e966"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x20800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 545.968221] IPVS: ftp: loaded support on port[0] = 21 [ 546.042396] IPVS: ftp: loaded support on port[0] = 21 [ 546.242064] net_ratelimit: 19 callbacks suppressed [ 546.242073] protocol 88fb is buggy, dev hsr_slave_0 [ 546.252165] protocol 88fb is buggy, dev hsr_slave_1 [ 546.257279] protocol 88fb is buggy, dev hsr_slave_0 [ 546.262387] protocol 88fb is buggy, dev hsr_slave_1 [ 546.322045] protocol 88fb is buggy, dev hsr_slave_0 [ 546.327168] protocol 88fb is buggy, dev hsr_slave_1 [ 546.586743] IPVS: ftp: loaded support on port[0] = 21 [ 546.622434] IPVS: ftp: loaded support on port[0] = 21 [ 547.362053] protocol 88fb is buggy, dev hsr_slave_0 [ 547.367196] protocol 88fb is buggy, dev hsr_slave_1 [ 548.082057] protocol 88fb is buggy, dev hsr_slave_0 [ 548.082102] protocol 88fb is buggy, dev hsr_slave_1 19:39:29 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x3001000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000000)={0xff, 0x3, 0x7f, 0x1f, 0x4, 0x8000, 0x8, 0x8001}, &(0x7f0000000040)={0x8, 0x3, 0x5, 0xfffffffffffff6e6, 0x5, 0x8, 0x800}, &(0x7f0000000100)={0x3, 0xffffffff, 0x8, 0x3f36, 0x400, 0x5, 0x10000, 0xac}, &(0x7f0000000140)) 19:39:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x20c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/211, 0xd3) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8678"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:29 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x88, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:39:29 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3001, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 548.298017] IPVS: ftp: loaded support on port[0] = 21 19:39:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x22800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8147, 0x40000) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 548.394637] IPVS: ftp: loaded support on port[0] = 21 19:39:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB=' \x00'], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x200, 0x610042) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1}) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 548.429347] IPVS: ftp: loaded support on port[0] = 21 19:39:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80040007ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x2) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x4083, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x2, 0x7, [0x7ff, 0x5, 0x3, 0x0, 0xfa, 0x20, 0xfffffffffffffff8]}, &(0x7f0000000240)=0x16) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0x4}, 0x8) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$KVM_SMI(r0, 0xaeb7) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x100, 0x100) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000040)=0x3) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x22c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 549.157794] IPVS: ftp: loaded support on port[0] = 21 [ 549.277658] IPVS: ftp: loaded support on port[0] = 21 [ 549.278408] IPVS: ftp: loaded support on port[0] = 21 19:39:30 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x4000000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x24800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:30 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="d5e0ef"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:30 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)='/dev/vhci\x00', 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000140)=""/243, 0xf3) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 549.996602] IPVS: ftp: loaded support on port[0] = 21 [ 550.553749] IPVS: ftp: loaded support on port[0] = 21 [ 551.522094] net_ratelimit: 19 callbacks suppressed [ 551.522102] protocol 88fb is buggy, dev hsr_slave_0 [ 551.532186] protocol 88fb is buggy, dev hsr_slave_1 [ 552.242090] protocol 88fb is buggy, dev hsr_slave_0 [ 552.242129] protocol 88fb is buggy, dev hsr_slave_1 [ 552.242148] protocol 88fb is buggy, dev hsr_slave_1 19:39:33 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x1100, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:39:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x24c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:33 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x9) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f0000000100)={{0x3, @addr=0x80000000}, "c156077e5087d00a65279fee046b15e64a8d36a1437e06bde8479814febbd579", 0x2}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0x1}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={r3, 0x40d, 0x0, 0xe6c}, 0x10) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:33 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x6002000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:33 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3c03, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 552.477393] IPVS: ftp: loaded support on port[0] = 21 [ 552.482139] protocol 88fb is buggy, dev hsr_slave_0 [ 552.487779] protocol 88fb is buggy, dev hsr_slave_1 [ 552.492970] protocol 88fb is buggy, dev hsr_slave_0 [ 552.498085] protocol 88fb is buggy, dev hsr_slave_1 [ 552.520407] IPVS: ftp: loaded support on port[0] = 21 [ 552.545389] IPVS: ftp: loaded support on port[0] = 21 [ 552.562131] protocol 88fb is buggy, dev hsr_slave_0 [ 552.990653] IPVS: ftp: loaded support on port[0] = 21 [ 553.013046] IPVS: ftp: loaded support on port[0] = 21 [ 553.121873] IPVS: ftp: loaded support on port[0] = 21 [ 553.195329] device bridge_slave_1 left promiscuous mode [ 553.200837] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.259114] device bridge_slave_0 left promiscuous mode [ 553.264682] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.456347] device hsr_slave_1 left promiscuous mode [ 553.498244] device hsr_slave_0 left promiscuous mode [ 553.556942] team0 (unregistering): Port device team_slave_1 removed [ 553.578100] team0 (unregistering): Port device team_slave_0 removed [ 553.602968] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 553.657946] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 553.781441] bond0 (unregistering): Released all slaves [ 556.642086] net_ratelimit: 13 callbacks suppressed [ 556.642094] protocol 88fb is buggy, dev hsr_slave_0 [ 556.652148] protocol 88fb is buggy, dev hsr_slave_1 [ 556.657221] protocol 88fb is buggy, dev hsr_slave_0 [ 556.662291] protocol 88fb is buggy, dev hsr_slave_1 [ 556.722086] protocol 88fb is buggy, dev hsr_slave_0 [ 556.727174] protocol 88fb is buggy, dev hsr_slave_1 [ 557.692379] IPVS: ftp: loaded support on port[0] = 21 [ 557.780897] chnl_net:caif_netlink_parms(): no params data found [ 557.840138] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.855390] bridge0: port 1(bridge_slave_0) entered disabled state [ 557.865957] device bridge_slave_0 entered promiscuous mode [ 557.876916] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.886687] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.897229] device bridge_slave_1 entered promiscuous mode [ 557.919371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 557.930639] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 557.956778] team0: Port device team_slave_0 added [ 557.967427] team0: Port device team_slave_1 added [ 558.024558] device hsr_slave_0 entered promiscuous mode [ 558.102344] device hsr_slave_1 entered promiscuous mode [ 558.161609] bridge0: port 2(bridge_slave_1) entered blocking state [ 558.168043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 558.174672] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.181238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 558.228596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 558.250111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 558.264508] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.271490] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.281502] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 558.295993] 8021q: adding VLAN 0 to HW filter on device team0 [ 558.305537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 558.313224] bridge0: port 1(bridge_slave_0) entered blocking state [ 558.319558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 558.330476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 558.338511] bridge0: port 2(bridge_slave_1) entered blocking state [ 558.344917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 558.364839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 558.373252] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 558.389350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 558.397079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 558.405950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 558.415975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 558.436325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 558.482110] protocol 88fb is buggy, dev hsr_slave_0 [ 558.482246] protocol 88fb is buggy, dev hsr_slave_0 [ 558.487210] protocol 88fb is buggy, dev hsr_slave_1 [ 558.492226] protocol 88fb is buggy, dev hsr_slave_1 [ 558.577338] IPVS: ftp: loaded support on port[0] = 21 19:39:40 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x26800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:40 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x4000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:40 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x6200000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:40 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x8800, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 559.204845] IPVS: ftp: loaded support on port[0] = 21 [ 559.271302] IPVS: ftp: loaded support on port[0] = 21 [ 559.284020] IPVS: ftp: loaded support on port[0] = 21 19:39:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x26c00, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:40 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x7, &(0x7f0000000580)=[{&(0x7f0000000140)="ca259fd518f4c352580fcfefcbc686781d05f5809da86d197d7a74d4", 0x1c, 0x89}, {&(0x7f0000000180)="a6272645e79afedc2247899dbf132fa9680a6e", 0x13, 0x9}, {&(0x7f00000001c0)="07bb338825226a71ddc378cd9601e8a860c7ba8fb2921c9cfc4a68c26271b73dbdfc8d7d8995dbf8d5ec469a00e311890fa2f99a7fb6979807315938ab7166ec8fd9277352b31130f7229a574235ce40d75dbe21be5b8d081c6106f1ffd1e1f5102ea7b9252bdb437f53e17a474f0b18294d580fe186b402fdb66c683f32084207f4707d9bf90ddef8871dfce42857000fa7aa44371aa80318541215f3b312ab28a93d103aeb5b24c32e381018224eaa313bd6871b703bd28f35c9593102a48e83cb770de2fbbfd43de29a14297a80987b905f9008debcd930baa8847d14ca9139e9960712a71c6b155c1eb2d5b43cad0b23ef73", 0xf4, 0x6}, {&(0x7f00000002c0)="80de41b68edb213e9645cf32475f67499ca1f2e41598ebe9f86915516fdb795779c82d1bef4bcfd0f6791a9df707b1d6a7634b52d8e9a09080b435d2c9d4e306", 0x40, 0x2}, {&(0x7f00000003c0)="7aad434ba1c98cca8e2f39a7f27d5c4ddae9a97158d8f24e2919a7ca06d9a5fffcac252a707352aa97a7347ed89edd57c6bbb7e100542dfe916fd526ddf862df9b4e4ef005a8cc46061e4a79ee64004de4fe1168a46d84c60f88c23d5371c9b222f9fc4a933381957cf6745bbc2e02496f50366a890426e662e0e371a5de0f69b199c448adca77176dfdd4c7aa301c2218", 0x91, 0x2}, {&(0x7f0000000480)="441a7130996dc9675e994962657442792fa28b12abb1f115c647cd5dcafdca66a671ed98a573aea5fe4b382b1d4b12474d0e065f72ff0eeb33a846e8fe82ae71de9056b27801dfbd8abe115dd8a4c7ea4946448eb4930d50c450932288b6748225ab6cdc8d213e192ddd945b5cf90ebb7d05dd70b045bf75a4aa57ab5610e5ebae11a6069bf93990d5ff0c13e2359b6b1cc01a907266a0608eaf3f41c66dbdba6df919ecbc959b6ad5505192d9d54174999152e7b0ec9a5b7a1a05e6890cda257fb190b1657e3e27c036b123999c901f1d52", 0xd2, 0x4562}, {&(0x7f0000000300)="b09487877cc85551cd5da903947c11ad09580761a92fef8acf2c68799320784bab81e480ac2fdc09b1258c9fb4b6626c01cde7cf2942c830a91574ab95b4f1657dc9548f22569dbdd45b2e26013328828e2b", 0x52, 0x6}], 0x8, &(0x7f0000000640)='/dev/vhci\x00') exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000040)='./file0/file0\x00', 0x8000001043, 0x3) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x604000) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x28800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:40 executing program 2: socketpair$unix(0x1, 0x8000a, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x1000000000480004, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x250200, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f00000002c0)=""/4096) r2 = creat(0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = dup(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') setsockopt$sock_int(r3, 0x1, 0x21, &(0x7f0000000240), 0x4) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$TCGETS(r4, 0x5401, &(0x7f00000000c0)) ioctl$BLKPG(r4, 0x1269, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000000140), &(0x7f00000001c0)=0x6) listen(r1, 0x4) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, 0x0) finit_module(r3, &(0x7f00000012c0)='system/selinux@system\x00', 0x2) r5 = open(&(0x7f0000000280)='./file0\x00', 0x20141042, 0xfffffffffffffffc) ftruncate(r5, 0x80080) sendfile(r4, r5, 0x0, 0x2008000fffffffe) r6 = creat(&(0x7f0000000680)='./bus\x00', 0x84) write$FUSE_NOTIFY_POLL(r6, &(0x7f0000000080)={0x18}, 0x18) fallocate(r6, 0x0, 0x0, 0x8005) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x0) 19:39:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2a800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 560.127871] IPVS: ftp: loaded support on port[0] = 21 19:39:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x8000, 0x5) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000000)=0x4) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x40000, 0x0) 19:39:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2c800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 560.279620] IPVS: ftp: loaded support on port[0] = 21 [ 560.449235] IPVS: ftp: loaded support on port[0] = 21 [ 562.642046] net_ratelimit: 26 callbacks suppressed [ 562.642053] protocol 88fb is buggy, dev hsr_slave_0 [ 562.642080] protocol 88fb is buggy, dev hsr_slave_1 [ 562.647144] protocol 88fb is buggy, dev hsr_slave_1 [ 562.882067] protocol 88fb is buggy, dev hsr_slave_0 [ 562.887171] protocol 88fb is buggy, dev hsr_slave_1 [ 562.892342] protocol 88fb is buggy, dev hsr_slave_0 [ 562.897410] protocol 88fb is buggy, dev hsr_slave_1 [ 562.962037] protocol 88fb is buggy, dev hsr_slave_0 [ 562.962050] protocol 88fb is buggy, dev hsr_slave_0 [ 562.967118] protocol 88fb is buggy, dev hsr_slave_1 [ 563.116549] device bridge_slave_1 left promiscuous mode [ 563.136330] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.203197] device bridge_slave_0 left promiscuous mode [ 563.208694] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.356454] device hsr_slave_1 left promiscuous mode [ 563.397720] device hsr_slave_0 left promiscuous mode [ 563.465286] team0 (unregistering): Port device team_slave_1 removed [ 563.477661] team0 (unregistering): Port device team_slave_0 removed [ 563.488066] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 563.569298] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 563.657023] bond0 (unregistering): Released all slaves [ 563.787399] IPVS: ftp: loaded support on port[0] = 21 [ 563.955517] chnl_net:caif_netlink_parms(): no params data found 19:39:45 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x4a02, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400200, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0xffffffffffffff1a) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:45 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x1000000, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:39:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2e800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:45 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x6400000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 564.392697] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.399080] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.455346] device bridge_slave_0 entered promiscuous mode [ 564.478103] bridge0: port 2(bridge_slave_1) entered blocking state [ 564.487424] IPVS: ftp: loaded support on port[0] = 21 19:39:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x4000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40c0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x9, 0xe0000000000000, 0x0, 0x6, 0x1, 0x401, 0x3, 0x8bc, 0x0}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000002c0)={r2, 0x81}, &(0x7f0000000300)=0x8) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r4 = getpid() ioprio_get$pid(0x2, r4) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000180)={0x0, @reserved}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 564.502197] IPVS: ftp: loaded support on port[0] = 21 [ 564.523245] IPVS: ftp: loaded support on port[0] = 21 [ 564.532150] bridge0: port 2(bridge_slave_1) entered disabled state 19:39:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x30800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 564.565628] device bridge_slave_1 entered promiscuous mode [ 564.633446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 564.656177] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 564.784240] team0: Port device team_slave_0 added [ 564.886448] team0: Port device team_slave_1 added [ 565.127608] device hsr_slave_0 entered promiscuous mode [ 565.140671] IPVS: ftp: loaded support on port[0] = 21 [ 565.192337] device hsr_slave_1 entered promiscuous mode [ 565.219961] IPVS: ftp: loaded support on port[0] = 21 [ 565.278229] IPVS: ftp: loaded support on port[0] = 21 [ 565.401834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 565.487096] 8021q: adding VLAN 0 to HW filter on device team0 [ 565.503207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 565.511484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 565.548244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 565.558648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 565.573669] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.580066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 565.601683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 565.618789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 565.635588] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.642038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 565.663489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 565.679362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 565.696361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 565.713277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 565.747054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 565.756926] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 565.773622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 565.789872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 565.820484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 565.829940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 565.848558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 565.893718] 8021q: adding VLAN 0 to HW filter on device batadv0 19:39:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00'], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x32800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fadvise64(r0, 0x0, 0xfff, 0x8) 19:39:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @rose, @null, @rose, @rose, @netrom, @rose, @bcast]}, &(0x7f0000000100)=0x48, 0x80800) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000140)) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000001c0)={0xe90, 0x8, 0x678, 0x200}, 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000002c0)={0x3, @default, r3}) 19:39:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x34800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 568.322173] net_ratelimit: 28 callbacks suppressed [ 568.322182] protocol 88fb is buggy, dev hsr_slave_0 [ 568.332245] protocol 88fb is buggy, dev hsr_slave_1 [ 568.882030] protocol 88fb is buggy, dev hsr_slave_0 [ 568.882062] protocol 88fb is buggy, dev hsr_slave_1 [ 568.887129] protocol 88fb is buggy, dev hsr_slave_1 [ 569.122043] protocol 88fb is buggy, dev hsr_slave_0 [ 569.127138] protocol 88fb is buggy, dev hsr_slave_1 [ 569.132274] protocol 88fb is buggy, dev hsr_slave_0 [ 569.137327] protocol 88fb is buggy, dev hsr_slave_1 19:39:50 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x5a03, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:50 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x11000000, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:39:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x36800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:50 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00') write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:50 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x8202000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x8) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="f7f2c179ff4d63930c02cd8052bdd8f37f613c0e8b2af6c5a40d6754bba8be699342b5566a1c1d36efb24a91021f5cd60e72b4fe522130882726e0698c64f7b50f5b8f072fc41501ae949b05826221b08534b8cab8f7b1049bd5212e95275f908b204ff4ee3d16868b1258c7f82585b6d331d5a773b420dafc3dfd41c86682"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) prctl$PR_GET_SECUREBITS(0x1b) openat$rtc(0xffffffffffffff9c, 0x0, 0xfffffffffffffffd, 0x0) getpid() [ 569.202075] protocol 88fb is buggy, dev hsr_slave_0 [ 569.291935] IPVS: ftp: loaded support on port[0] = 21 19:39:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x38800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 569.321926] IPVS: ftp: loaded support on port[0] = 21 [ 569.449158] IPVS: ftp: loaded support on port[0] = 21 19:39:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x3a800, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:50 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)={'stack ', '/dev/vhci\x00'}, 0x10) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x40000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netfilter\x00') write$capi20(r0, &(0x7f0000000040)={0x10, 0x1, 0x86, 0x82, 0x1, 0x4}, 0x10) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:50 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x8140, 0x0) connect$vsock_dgram(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @hyper}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1ffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lremovexattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)=@random={'system.', '/dev/vhci\x00'}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 570.286385] IPVS: ftp: loaded support on port[0] = 21 [ 570.289466] IPVS: ftp: loaded support on port[0] = 21 [ 570.529556] IPVS: ftp: loaded support on port[0] = 21 19:39:54 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x6202, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x80000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x8000, 0x3, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0x400, 0x2, 0x1, 0x0, 0x9, 0x7ff, 0x6, 0x5, 0xff, 0x9, 0x3, 0xffffffff80000000, 0x1, 0x400, 0x8, 0x34}}) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:54 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x88000000, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:39:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000040)='./file0\x00', 0x420, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:54 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x8800000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 573.249224] IPVS: ftp: loaded support on port[0] = 21 19:39:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xa0, 0x24000) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000100)=0x8) clone(0xffff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00c400aa62f737a444155befd996f5024179828e12f9d8ff5f110343eb2534c3ae5804d1780c902756bedeba052293051d383d4279c43d65bf8e"], 0xfffffffffffffed5) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 573.271247] IPVS: ftp: loaded support on port[0] = 21 19:39:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x1010400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x80100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 573.324495] IPVS: ftp: loaded support on port[0] = 21 [ 573.362045] net_ratelimit: 23 callbacks suppressed [ 573.362052] protocol 88fb is buggy, dev hsr_slave_0 [ 573.372103] protocol 88fb is buggy, dev hsr_slave_1 19:39:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x80200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x3, 0x4) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4800) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000004c0)={"49a8b6368f9afa74b74c5052a74fa27bca1d80fa814929e2bbad0d32fb3d703a937c8b9b7f31bf403bd4b6f66010e62f2e22e4c108813019c23133f8b96f9ac11359d0df2869215ffc6e19c784b0d537134abb0946bab9f33e69ac13c05b459b09514f6d0096b898f7b010af186dded3a5bf684d5a8907858d885a800acd11b1699796db1b4029451e4db651da5b7c799a5fd6dcccbc695c35383c12416b5e786feea9b05e9270b04c578eb471eaad5ec9b54d701d3a3f027e68d3f562ba16bf9337948f462f66d1ba9cb7efa641863e9f78366ad1324b7451f46157cbbaa69294e75836bcc8e50b39ea5c742ec38ad57e86da28618bdbdf2c7c0048ee88dbeb6788d44d617bdbc0445074a05250c3986ab56c5c6cbb8583f9dba8fe0cefc58a75d927e5789753e749625d230a6492299316ab4d67984329e845cf41e11a49ab4bf38c08ecd3b62925882fd953e59f56bcb44eff044ccfdbd579d4f4d06d270c072032a9b90e718177648ac305485e10c12692596c0a2069b552800177f5dd703a3bf962a992f7ae65d5ad4293501915307c6256f9e5c085b0dc795fc5683ed7aad479291c2ddb5abd9d77b2d82f45d3bd2bcab3c942d4be54faa314c31c4da4956df963cb0c13d6f781a94c77f0cd10989af8a6928a1a8b057d4a10f46146a9d2a5966ea714ac10b2b7b4ef14c518ea4e4e7a65ad576f37ddb2f7fe9b858268d7fa12d51ad06d767b1a7f4bf0e7c1035f0952615b5b3dc7ea96e321f2969092443c42701bcfc40569dbf91368423c18e3202ef0c09a56b4510619f22590df8ee8889214a007b061a673856538e8949c00da1f978ca54d2a65f8bcea391b0be8fe73eadd99fec0862825cc7c4472e8f12a871bb3f2e2f02c2e859786017583f28c4dc2118b2b4a5c3e6b49e0125d240c931efd01e4d9acbae098cd67b12e122c6e005b8bc01a44bcf4caa3fe0f9ba0512166dec0e3d52019c36ab1370e1dca4e240d98ca4a82dacc6e64a9bc82a1f0f364febb53ecd392a05e5202b41a89a237a72e7514e7bbcf39d9bccf246b70dae008a881622b1170e149eecaf55a723e87d8f8fed9f81d07bc8f6b6669e949e34c1d256a2f0f59d2ecde4f0fe10606a6553bf3999890c22cf763a286896278d5300b7ba714a2664315faca33c4cd0fd4d0ff3b56eab8a6a5909fae7a48b6b0655d14c3b1f49f7be7dddda7bb74ee13d3fc25d42881136866917ad9980e3afdb4759d6ad057991f82ba61d024d86c0afc5eca516d934b46ca398e8ca8a2eb939f1608389b29aace5532a20dad2afb5b0870002027e9d49a03d2430f71214d5084cee1bdff60d78ff61a35c9bf746c36a7a872531097cf5556987e4e2eb6806c2d8c75b66605d46bec8f1eef6621b260122a2e5e6164e6e482f8750b949505339ed2b30a846ffaa7418016531c948daa4785"}) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 574.014299] IPVS: ftp: loaded support on port[0] = 21 [ 574.051588] IPVS: ftp: loaded support on port[0] = 21 [ 574.083834] IPVS: ftp: loaded support on port[0] = 21 [ 574.562057] protocol 88fb is buggy, dev hsr_slave_0 [ 574.567188] protocol 88fb is buggy, dev hsr_slave_1 [ 575.122044] protocol 88fb is buggy, dev hsr_slave_0 [ 575.122088] protocol 88fb is buggy, dev hsr_slave_1 [ 575.127150] protocol 88fb is buggy, dev hsr_slave_1 [ 575.362083] protocol 88fb is buggy, dev hsr_slave_0 [ 575.367189] protocol 88fb is buggy, dev hsr_slave_1 [ 575.372361] protocol 88fb is buggy, dev hsr_slave_0 19:39:57 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x7401, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:39:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x80300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x80001, 0x82) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 576.510977] IPVS: ftp: loaded support on port[0] = 21 [ 576.773979] IPVS: ftp: loaded support on port[0] = 21 19:39:57 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x100000000000000, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:39:57 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x249) syz_open_dev$sndmidi(&(0x7f0000000680)='/dev/snd/midiC#D#\x00', 0x1, 0x4000) write$P9_RLERRORu(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x2, &(0x7f0000000580)=[{&(0x7f00000003c0)="10c6460a4892f3aee65e037afb9c735af47d526a7220b6ca1fb19bef79221ad4e4fbd5d33299cabbf0367e9728364a518fecb718390ca2619c62f9e68d1edd73a1cb1cf5b33e41630e35a9f1ced6ed122334b8e25276ef64dab10ee2b3f3229d20524945f91012c6b8c0c2ca1a67f2756173c086526a37a893cbd487476cc5701634df4166e2710365c09747e642cad26f6cd480599aff0a2ebd62d7d66ebd", 0x9f, 0x4}, {&(0x7f00000004c0)="7ec7e6781ced7c6321705042613786b8392782a262de9f59b1d8d9525a8bc7389ab20641eaae47bec7f1d542292972fc7a0bd960c8334b3fae22f4941bcdc7af808539cab401c42075c7e67067fca59ca06ed385cd4e293e4eebf893ca566168584e8e10ccc841f787c1cb3372953cbd40a529d1072622d13d5da91cccc9603fcf7112a9989512989dbbd82624b356752f77d1bd6f97d4805de31d53faa9", 0x9e, 0x1}], 0x1000044, &(0x7f00000005c0)={[{@session={'session', 0x3d, 0x4}}, {@barrier='barrier'}, {@session={'session', 0x3d, 0x7ff}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@permit_directio='permit_directio'}]}) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000640)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r1, 0x10, &(0x7f00000000c0)={&(0x7f0000000040)=""/30, 0x1e, 0xffffffffffffffff}}, 0x10) 19:39:57 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x9800000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:39:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ea523d12dbadb6ebbd01f134b384db186baaf38bd4fa5ddd53908a971a8b8dd55a9932898df2111869b276f62ef109f8cc98b738691ec56c818"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:57 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x7501, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 577.106889] IPVS: ftp: loaded support on port[0] = 21 [ 577.129522] IPVS: ftp: loaded support on port[0] = 21 19:39:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc0200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 577.159705] hfsplus: unable to parse mount options [ 577.170410] IPVS: ftp: loaded support on port[0] = 21 19:39:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x5, 0x80200) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) r3 = getegid() mount$fuse(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x481, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xb12ad96c3a2717ac}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x80000001}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@obj_role={'obj_role', 0x3d, 'system_u:object_r:initctl_t:s0\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x38, 0x76, 0x77, 0x36, 0x3f, 0x62, 0x34], 0x2d, [0x31, 0x7b], 0x2d, [0x62, 0x62, 0x75, 0x7f], 0x2d, [0x0, 0x77, 0x64], 0x2d, [0x66, 0x7a, 0x77, 0x39, 0x3f, 0x39, 0x62, 0x36]}}}]}}) r4 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x2, 0x2) mq_notify(r4, &(0x7f00000002c0)={0x0, 0x11, 0x1, @thr={&(0x7f0000000180)="369c33fe5c4cd973d4f54271eaa612ee49077bf4f10353232e1517bfeb99ce1175bd52bf7189361b2f03166b6fb646af564ade7ea3f844b6807d81157f137d59a6dbe33a2c1ad774cafe9033c63e92d64e3b01810f212dfb076e26002c1cdbc98f475f99ca369464f439c57c4aa4441cfd767a11b74756d0e7a91205bfbade380666ec8c092e6304022df51c4b20ece31cbb834f83f8b201f06fee80b11982e174d95378aad193d66b50c41113ec", &(0x7f0000000240)="590d3088611eaac2346c8d0cd6fd565148b0804e91593386add9629c1d66238f5a8343e41363e0aadba862dd480bc012a84dff85e2ccbbe2a924bd32909c5c4b3ae681d7e53fea34f6bf001d406495828fc0244956b8abef163dc0777ca3a5ffc293"}}) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:initctl_t:s0\x00', 0x1f, 0x2) ioctl$KVM_GET_LAPIC(r4, 0x8400ae8e, &(0x7f0000000740)={"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"}) accept4$unix(r4, &(0x7f0000000300), &(0x7f00000003c0)=0x6e, 0x80000) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./file0\x00', 0x30) setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000bc0)={0x2, 0x4e24, @local}, 0x10) 19:39:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x180000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:39:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getuid() quotactl(0x7ff, &(0x7f0000000040)='./file0/file0\x00', r1, &(0x7f0000000100)="f258ae69c9edc218abc24f34a6fd09c4cc5fb79dd8363ccbf6397493c683708af190a94e796e1185676de6a491643b7907ef3f5f92c8c16ce906b5e42ccd5b3c046181ee6f39fe4def91debef13eba94b36c026718f9a263f6598a9de61168c642403e9502e757233e679b74ea25f5634222b4fd854cfa71ec88100ab784486829dd450df9304e0c512e124491ed5ab295e653dbb56e4a843323d1b79c7fe3574d72fc3b1185e774831b52751e2e97630e71058f8c43fd468b4f236497") r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x0, 0x100, 0x1}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:39:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x10000) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 578.085712] IPVS: ftp: loaded support on port[0] = 21 [ 578.096197] IPVS: ftp: loaded support on port[0] = 21 [ 578.129528] IPVS: ftp: loaded support on port[0] = 21 [ 578.722042] net_ratelimit: 15 callbacks suppressed [ 578.722050] protocol 88fb is buggy, dev hsr_slave_0 [ 578.732219] protocol 88fb is buggy, dev hsr_slave_1 [ 579.282050] protocol 88fb is buggy, dev hsr_slave_0 [ 579.282065] protocol 88fb is buggy, dev hsr_slave_0 [ 579.287139] protocol 88fb is buggy, dev hsr_slave_1 [ 579.292231] protocol 88fb is buggy, dev hsr_slave_1 [ 579.522204] protocol 88fb is buggy, dev hsr_slave_0 [ 579.527363] protocol 88fb is buggy, dev hsr_slave_1 [ 579.532517] protocol 88fb is buggy, dev hsr_slave_0 [ 579.537570] protocol 88fb is buggy, dev hsr_slave_1 19:40:02 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x1100000000000000, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x200000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0xb93c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x13f}}, 0x20) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) flistxattr(r2, &(0x7f0000000000)=""/14, 0xe) 19:40:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000000100)="42f2a5fb73e78a7ddfac4ca1a11f41d9313bb49bbdcf9a7b7864377fca3c3c69dcb066e8703f37d5384a7d7030c368cb0e31934ad7352eead4121aea9e7733fc59fd58e8ffd4aa0459060b7f187efbc335a8ba23341cd23c63d680b0354a9fb9f9fa1d32a4e1a942f06b44408269b69ef003273e3ad1e9515b97928d5d5aa1b5ee17e4449b", 0x85, 0x40000, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x3, 0x0, "90bc31d1f549196dc33a5eb869dd94a1a2e50600a1e09256cd815d89507ee310ab589ec885d4d9833a5a6e2be5e8d7018186238a3ed14bdc2aa97ddebda1d30cdfceae3b5e1c94cfed226bd509ee4dea"}, 0xd8) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x4502, 0x0) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000300)={0x1, 0x8, 0x5, 0x80000, r4}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:02 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x9effffff00000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:02 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8200, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 581.668859] IPVS: ftp: loaded support on port[0] = 21 [ 581.686580] IPVS: ftp: loaded support on port[0] = 21 [ 581.744231] IPVS: ftp: loaded support on port[0] = 21 19:40:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x10000) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00fbc5040873b95fb66582eef453bb2020dfc7eb582fa7104962fe89d5c49eed34216e58c1283f52271f999250ff06a7c080d14f93712c7c5ac3d5ab6516507fb5080a7fdbdafcef5e588c9cfd1009eca39370e70669c1cef8686a029fbffd257c70f04ef99362321f22a7672c13a5e1f52391543ffeefcf23358c729b43e5324f131370986ae9cb320ed8418094ab2a183f16880be26110b3779f93a3d420e4f5c0dc54fa35d0091ce0f8d9ef1e72182b2fd327b500000000000000000000000000000000"], 0xc5, 0x2) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="aa45e8e2c650dfc7b3b26207d7"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = getpgid(0xffffffffffffffff) sched_getaffinity(r1, 0x8, &(0x7f0000000200)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x280000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e880"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x8001007, 0x0, 0x2}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x280100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) accept4(r1, &(0x7f0000000000)=@can, &(0x7f0000000100)=0x80, 0x800) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="a980a7da3f8864df3a8a829bf22efcd55edbab4550b304fe85b3f1858de4d453dd07d060a12226dd2cf5a9c81381b41a9d0a912b67ab08fc255a2e0d878ce9ec6e062d48419b0ae2ec94f0a15893e7a6b73b319925b157608dfe77f71cf7"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 582.589223] IPVS: ftp: loaded support on port[0] = 21 [ 582.599074] IPVS: ftp: loaded support on port[0] = 21 [ 582.601118] IPVS: ftp: loaded support on port[0] = 21 19:40:03 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x8800000000000000, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x280200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x280300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 582.960045] IPVS: ftp: loaded support on port[0] = 21 [ 583.762079] net_ratelimit: 23 callbacks suppressed [ 583.762093] protocol 88fb is buggy, dev hsr_slave_0 [ 583.772312] protocol 88fb is buggy, dev hsr_slave_1 [ 583.825271] IPVS: ftp: loaded support on port[0] = 21 [ 584.962059] protocol 88fb is buggy, dev hsr_slave_0 [ 584.967163] protocol 88fb is buggy, dev hsr_slave_1 [ 585.522092] protocol 88fb is buggy, dev hsr_slave_0 [ 585.522124] protocol 88fb is buggy, dev hsr_slave_1 [ 585.527200] protocol 88fb is buggy, dev hsr_slave_1 [ 585.585265] IPVS: ftp: loaded support on port[0] = 21 [ 585.708650] chnl_net:caif_netlink_parms(): no params data found [ 585.762058] protocol 88fb is buggy, dev hsr_slave_0 [ 585.767149] protocol 88fb is buggy, dev hsr_slave_1 [ 585.772279] protocol 88fb is buggy, dev hsr_slave_0 [ 585.849042] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.856596] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.864354] device bridge_slave_0 entered promiscuous mode [ 585.908100] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.922449] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.929615] device bridge_slave_1 entered promiscuous mode [ 585.999143] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 586.018707] bond0: Enslaving bond_slave_1 as an active interface with an up link 19:40:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2c0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000100)={0x6, 0x2, 0x800, 0xc32b, 'syz0\x00', 0x7ff}) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x100, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:06 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xa600000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 586.064263] team0: Port device team_slave_0 added [ 586.070377] team0: Port device team_slave_1 added [ 586.154497] IPVS: ftp: loaded support on port[0] = 21 [ 586.235057] device hsr_slave_0 entered promiscuous mode [ 586.272403] device hsr_slave_1 entered promiscuous mode [ 586.375967] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.382379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.389005] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.395386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.433141] IPVS: ftp: loaded support on port[0] = 21 [ 586.464410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 586.479479] 8021q: adding VLAN 0 to HW filter on device team0 [ 586.490165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 586.497902] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.505864] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.514205] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 586.552498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 586.560090] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.566490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.588123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 586.596728] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.603121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.618169] device bridge_slave_1 left promiscuous mode [ 586.625530] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.672694] device bridge_slave_0 left promiscuous mode [ 586.678149] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.815290] device hsr_slave_1 left promiscuous mode [ 586.855678] device hsr_slave_0 left promiscuous mode [ 586.895553] team0 (unregistering): Port device team_slave_1 removed [ 586.908976] team0 (unregistering): Port device team_slave_0 removed [ 586.919901] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 586.959966] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 587.030310] bond0 (unregistering): Released all slaves [ 587.142483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 587.152688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 587.161857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 587.169459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 587.177218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 587.193202] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 587.203819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 587.210710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 587.220715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 587.248006] 8021q: adding VLAN 0 to HW filter on device batadv0 19:40:08 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x2, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8202, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:40:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x5) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:08 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0x8021}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2c0200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 587.336977] IPVS: ftp: loaded support on port[0] = 21 [ 587.369551] IPVS: ftp: loaded support on port[0] = 21 19:40:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x200481, 0x0) 19:40:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYRES64=0x0], 0x8) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x480000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x480100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 588.037760] IPVS: ftp: loaded support on port[0] = 21 19:40:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x480200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 588.270070] IPVS: ftp: loaded support on port[0] = 21 [ 589.122051] net_ratelimit: 20 callbacks suppressed [ 589.122060] protocol 88fb is buggy, dev hsr_slave_0 [ 589.132140] protocol 88fb is buggy, dev hsr_slave_1 [ 589.682041] protocol 88fb is buggy, dev hsr_slave_0 [ 589.682158] protocol 88fb is buggy, dev hsr_slave_0 [ 589.687137] protocol 88fb is buggy, dev hsr_slave_1 [ 589.692183] protocol 88fb is buggy, dev hsr_slave_1 [ 589.702276] protocol 88fb is buggy, dev hsr_slave_0 [ 589.707324] protocol 88fb is buggy, dev hsr_slave_1 [ 589.922070] protocol 88fb is buggy, dev hsr_slave_0 [ 589.927175] protocol 88fb is buggy, dev hsr_slave_1 19:40:11 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xc801000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 590.496913] IPVS: ftp: loaded support on port[0] = 21 [ 590.842228] IPVS: ftp: loaded support on port[0] = 21 19:40:11 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x3, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:11 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000040)=0x7fffffff) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x480300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getgid() perf_event_open(&(0x7f0000000680)={0x3, 0x70, 0x4, 0x80, 0x10000, 0x6, 0x0, 0x4, 0x10, 0x8, 0xff, 0x400, 0x10001, 0x2, 0x0, 0x1ff, 0xd765, 0x6, 0x0, 0x7, 0xf447, 0xffffffffffffd8f9, 0x0, 0x10000, 0x6, 0x100000000, 0x3, 0x0, 0x1, 0x1, 0x200, 0x8, 0x5, 0x7, 0x7ff, 0xd787, 0x494b, 0xcd, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000640), 0x4}, 0x0, 0x7, 0x0, 0xb, 0x5, 0x8, 0x4}, 0xffffffffffffffff, 0x6, r0, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x20, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000100)="c4726ce2d625b32316c1615275b1f2ae49444f3ecc573eb143ccb213bb1036d3c89693fca0a17689f238a9aaf6f6f070a1ecbe8839e9cbf45b92270fd0f8e2ecea4cbd4408f5e4a870598f69494da9f7e4a64d9a629aeae6edfaaf69e1e95af63b15b2b8f50544f219f623b72faa3f", 0x6f}, {&(0x7f0000000180)="2a3a57a15e8465bc97a687017c01ca404f005b1c61840823e3b9a4a8d2f42ad6f4bf7357b6ea26c62090125146586da71665061a12c4dce2261c678e295cbf8eb56e222190e4e953a6d1c52c9f06ced3e78427bb9a7a74fbb54e93448b35c210cda9d54d8802e6ad6af565a2b428f8f11ce3564a3926088c2aed833673f7519367988badcec205700cb4e544a6730e50a48587c9674a29bc6dded88540644b412852e214e6dec26500ec41ac776e6174be6ac5e9ada7364c6576d2b766b7312c1412cdd86bf8be096789", 0xca}, {&(0x7f0000000280)="4c8807bd3f4ee781eece4b5d71bca788887c913d852a25a1a42cb4af6a7a5b74da046013da99b5100ff7", 0x2a, 0x7f}, {&(0x7f00000002c0)="40c20ad7c657d7a7e4b0bb7840d58964f0d043c7681218efdfc86894f406bdb886e080c4a96d736f1d4a743bbaff20f27372c06969b451c48a3bd0f4d956d1bf7e575a32043fd13b2c195d8d2e55cce460b18505e64e1cb2a34acba936a8d9b696c418721a74f82cc214321bf4dc6a0417988e75b04dd3ad045f6e8fd9e2340b12edd96a9402b15e070d5a03966848a7abc97526069143a2af7bd0bdb3c133cd1df3a6b7267217e628b79fa4176f33247bc3f924", 0xb4}], 0x180000, &(0x7f00000005c0)={[{@map_acorn='map=acorn'}, {@gid={'gid', 0x3d, r1}}, {@check_strict='check=strict'}, {@check_strict='check=strict'}, {@cruft='cruft'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/vhci\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:11 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8800, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 591.039640] IPVS: ftp: loaded support on port[0] = 21 19:40:11 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xdc01000000000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c0000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 591.197374] IPVS: ftp: loaded support on port[0] = 21 [ 591.229620] IPVS: ftp: loaded support on port[0] = 21 19:40:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x480180, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="ff80a40be523fae4d9b404ae275a9dd5c2473cde649a8d61a4096ddf4adc56a994003c8fdbdf2459ba0700ca90d4a075e1726c239b1e07507550ed33e2c74a"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x7, 0x40) write$P9_RREADLINK(r1, &(0x7f0000000280)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x600, 0x0) r5 = syz_open_dev$swradio(&(0x7f0000000600)='/dev/swradio#\x00', 0x1, 0x2) r6 = syz_open_dev$audion(&(0x7f0000000640)='/dev/audio#\x00', 0x835, 0x80) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm_plock\x00', 0x200, 0x0) r8 = syz_open_dev$sndpcmc(&(0x7f00000006c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x30200) pipe2(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000840)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x250}, 0xc, &(0x7f0000000800)={&(0x7f0000000180)=ANY=[@ANYBLOB="94000000", @ANYRES16=r3, @ANYBLOB="100026bd7000fbdbdf25050000000c0005002000df00000000000c000300020000000000fb000c0003008a000000000000000c00060001000000000000000c00060001000000000000000c00050003000000000000000c00070008000120", @ANYRES32=r4, @ANYBLOB="2c00070008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="0891f22333a4c8ec3469c38b2624e3ef7e0f001a8b550205f423e67d5026a297ff3b91128dea8a4828203a", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9], 0x94}, 0x1, 0x0, 0x0, 0x8000}, 0x1) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c0200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 591.998107] IPVS: ftp: loaded support on port[0] = 21 [ 592.050916] IPVS: ftp: loaded support on port[0] = 21 [ 592.142411] IPVS: ftp: loaded support on port[0] = 21 19:40:15 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x4, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000004c0)={0x0, 0x0, 0x2080}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x4008000) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff8030bca619380816975fea53f17f24d2a2545eab1b50465b910c430fb4875b4e73a25c1d41208322f2fc88c630c4d3f6a424f0c3a84a14829dbc46f08f47d5b9f69ed24df5cecee842c22b84db593926080daaf65886"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x8000000004) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x8000000200, 0x0) 19:40:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x680000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 594.329526] IPVS: ftp: loaded support on port[0] = 21 [ 594.820384] IPVS: ftp: loaded support on port[0] = 21 19:40:16 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8a00, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:40:16 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xffffffff00000000, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x680100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:16 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x10100, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x100000001, 0x1) 19:40:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ffe71d15f259371e8c2ef5d22ff3b5ca72ae2d2678f3ca33a53848088c84b0f311ef40c842096ea868c93def64909605a97cb14f3e7882e6b9ae9a26422eb7e9fe8f74bdccf0dd5f5ae71f97ca510a69c9bab664353fec3ee812e0dc7ddc"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:16 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x6, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x680200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 595.239698] IPVS: ftp: loaded support on port[0] = 21 [ 595.258410] IPVS: ftp: loaded support on port[0] = 21 19:40:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x400080, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0xb20, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c000}, 0x1) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r3 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x800) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000280)=0x100000001, 0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 595.362084] net_ratelimit: 25 callbacks suppressed [ 595.362093] protocol 88fb is buggy, dev hsr_slave_0 [ 595.372197] protocol 88fb is buggy, dev hsr_slave_1 [ 595.399616] IPVS: ftp: loaded support on port[0] = 21 19:40:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x680300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:16 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/141) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c0000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 595.922074] protocol 88fb is buggy, dev hsr_slave_0 [ 595.922122] protocol 88fb is buggy, dev hsr_slave_1 [ 595.927158] protocol 88fb is buggy, dev hsr_slave_1 [ 595.937262] protocol 88fb is buggy, dev hsr_slave_0 [ 595.942394] protocol 88fb is buggy, dev hsr_slave_1 19:40:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 596.085570] IPVS: ftp: loaded support on port[0] = 21 [ 596.162079] protocol 88fb is buggy, dev hsr_slave_0 [ 596.167218] protocol 88fb is buggy, dev hsr_slave_1 [ 596.172393] protocol 88fb is buggy, dev hsr_slave_0 [ 596.280296] IPVS: ftp: loaded support on port[0] = 21 [ 596.290343] IPVS: ftp: loaded support on port[0] = 21 19:40:17 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8a01, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 596.745557] IPVS: ftp: loaded support on port[0] = 21 [ 597.261560] IPVS: ftp: loaded support on port[0] = 21 19:40:19 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0xffffffffffffffff, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c0200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@timestamp], 0x1) 19:40:19 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x7, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:19 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x9800, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 598.875590] IPVS: ftp: loaded support on port[0] = 21 [ 598.904995] IPVS: ftp: loaded support on port[0] = 21 [ 598.936162] IPVS: ftp: loaded support on port[0] = 21 19:40:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x880000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x880100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 599.256046] IPVS: ftp: loaded support on port[0] = 21 19:40:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x880200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 599.558429] IPVS: ftp: loaded support on port[0] = 21 [ 599.609503] IPVS: ftp: loaded support on port[0] = 21 [ 599.638626] IPVS: ftp: loaded support on port[0] = 21 [ 599.885938] chnl_net:caif_netlink_parms(): no params data found [ 600.044636] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.058641] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.081768] device bridge_slave_0 entered promiscuous mode [ 600.148513] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.158277] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.174039] device bridge_slave_1 entered promiscuous mode [ 600.306915] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 600.329227] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 600.484846] team0: Port device team_slave_0 added [ 600.504271] team0: Port device team_slave_1 added [ 600.598453] device hsr_slave_0 entered promiscuous mode [ 600.647699] device hsr_slave_1 entered promiscuous mode [ 600.902641] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.909036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 600.915713] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.922110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 600.944437] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.965602] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.999704] device bridge_slave_1 left promiscuous mode [ 601.020158] bridge0: port 2(bridge_slave_1) entered disabled state [ 601.083068] device bridge_slave_0 left promiscuous mode [ 601.089754] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.397360] device hsr_slave_1 left promiscuous mode [ 601.474708] device hsr_slave_0 left promiscuous mode [ 601.552626] team0 (unregistering): Port device team_slave_1 removed [ 601.591820] team0 (unregistering): Port device team_slave_0 removed [ 601.618254] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 601.695461] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 601.887116] bond0 (unregistering): Released all slaves [ 602.106733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 602.136655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 602.137058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 602.154896] 8021q: adding VLAN 0 to HW filter on device team0 [ 602.162049] net_ratelimit: 25 callbacks suppressed [ 602.162056] protocol 88fb is buggy, dev hsr_slave_0 [ 602.162082] protocol 88fb is buggy, dev hsr_slave_1 [ 602.167036] protocol 88fb is buggy, dev hsr_slave_1 [ 602.172084] protocol 88fb is buggy, dev hsr_slave_0 [ 602.182612] protocol 88fb is buggy, dev hsr_slave_1 [ 602.208759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 602.238006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 602.246485] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.252887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.292259] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 602.302020] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 602.320023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 602.328398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 602.352779] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.359160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 602.382296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 602.390311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 602.402083] protocol 88fb is buggy, dev hsr_slave_0 [ 602.407163] protocol 88fb is buggy, dev hsr_slave_1 [ 602.412326] protocol 88fb is buggy, dev hsr_slave_0 [ 602.412824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 602.417384] protocol 88fb is buggy, dev hsr_slave_1 [ 602.442756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 602.450496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 602.472775] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 602.480502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 602.488197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 602.496033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 602.504698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 602.513980] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 602.521014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 602.573812] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 602.603725] protocol 88fb is buggy, dev hsr_slave_0 19:40:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x109000) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0xdc, 0xa2, 0x4, 0xffffffffffffff29}) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x880300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ffab6d78ecb1f9912e29"], 0x2) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:23 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x2, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 602.952828] IPVS: ftp: loaded support on port[0] = 21 19:40:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8c0000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:24 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 19:40:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0xdb9d836bc96851cb, 0x0) 19:40:24 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x8, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:24 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x9a00, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:40:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8c0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000040)=0x8, 0x4) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) prctl$PR_SET_ENDIAN(0x14, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 603.474954] IPVS: ftp: loaded support on port[0] = 21 19:40:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa80000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 603.529509] IPVS: ftp: loaded support on port[0] = 21 19:40:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, 0x0}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x20300) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000004c0)=""/4096, &(0x7f0000000040)=0x1000) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa80100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 603.755199] binder: 23612:23613 BC_INCREFS_DONE u0000000000000000 no match 19:40:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa80200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 603.988137] IPVS: ftp: loaded support on port[0] = 21 19:40:25 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x3, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa80300, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "31afaf"}, 0x4, 0x2) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x800, 0x0) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000140)={0x9, 0x6}) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0860355eacccf005cd99e4a781f5eba85bc49648843cdb463121327e939d46dd29d1910e690efad78a973fa05d9ca6466c33ed1c4783e8aec556a106d5c04463074fa4ec0ec0a1eb429cf7e55fd1c5584fe6469a8c13784dc9272b6eb87620b899a3dec38ab3cebe3c1ffbbdff5d59ef2a4680b8e084b2989caed57449dd6698d73bbadcfd03de0822ac5e717b6dd86677de84415caa53"], 0x2) rmdir(&(0x7f0000000240)='./file0\x00') close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x1fc, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000280)={0x8, 0xff, 0x6, 0xff, 0x2, 0x3}) 19:40:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x904c0a}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="30001000", @ANYRES16=r3, @ANYBLOB="010029bd7000ffdbdf250e0000000c000200080009006f00000008000600010000000800050001000000"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000200)) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 604.352615] IPVS: ftp: loaded support on port[0] = 21 [ 604.431794] IPVS: ftp: loaded support on port[0] = 21 [ 604.440717] IPVS: ftp: loaded support on port[0] = 21 [ 604.918472] IPVS: ftp: loaded support on port[0] = 21 19:40:28 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x9, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xac0000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:28 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x40) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) ptrace$peekuser(0x3, r1, 0x6) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0x1f, 0x4, 0x0, 0xfffffffffffff14d, 0xd, 0x16a, 0x0, 0x0, 0x9, 0x80000000, 0x9, 0x1d}) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[], 0x0) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:28 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x4, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040)=0xfffffffffffffff7, 0x4) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:28 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xba00, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 607.821530] IPVS: ftp: loaded support on port[0] = 21 [ 607.839130] IPVS: ftp: loaded support on port[0] = 21 19:40:28 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xac0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:28 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x80000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)={0x0, 0xd34, 0x7, [0x200, 0x731, 0x9, 0x0, 0x500000000, 0x81, 0x4]}, &(0x7f0000000140)=0x16) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x60e}, &(0x7f0000000280)=0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000040)=0xc4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="ea180348f08079e4127d96ecd747962c04b0bcc16e98ea27897ff8eda6640231b8131b32eacf8bb76b352c422d2de3d792da96baa634245b5bc4e8f6926f20f23342f12de0f1817ad46c6bd98758668e4a12308f1f8720d8b4100c19d7e2c9c99ac33cafcbb4a2b5e397e13c4a943e1af2c50272004ad4ba15476918d610737d311712812bac560ed4bfe0bed3f64240bac1a380aa"], 0x2) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 607.979737] IPVS: ftp: loaded support on port[0] = 21 19:40:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="efc0"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x7, 0x204, 0x100000000, 0x5, r2}, 0x10) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="00004388fc01f17f8b77a26ccc084bde5efa3550a48075126db81ff38cef2db46921aa61b93a367143bf3887e8aa99f702f55171899bcd1f3d8e81b8e9792bc14bede81ce12cb55125dcd6c4c24171312f6be2548730e18ab035487780548b477e6ad2833c5ea8131cdd04e8319d004bfa9f203b3bb8c2a966d7652832ce628ca080996ddb8f36de7dd58f3258689c373cee"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) recvfrom$x25(r0, &(0x7f00000000c0)=""/22, 0x16, 0x40010001, &(0x7f0000000100)={0x9, @remote={[], 0x3}}, 0x12) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc80000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 608.402072] net_ratelimit: 31 callbacks suppressed [ 608.402080] protocol 88fb is buggy, dev hsr_slave_0 [ 608.402108] protocol 88fb is buggy, dev hsr_slave_1 [ 608.407099] protocol 88fb is buggy, dev hsr_slave_1 [ 608.412171] protocol 88fb is buggy, dev hsr_slave_0 [ 608.427230] protocol 88fb is buggy, dev hsr_slave_1 [ 608.628573] IPVS: ftp: loaded support on port[0] = 21 [ 608.642103] protocol 88fb is buggy, dev hsr_slave_0 [ 608.647211] protocol 88fb is buggy, dev hsr_slave_1 [ 608.652390] protocol 88fb is buggy, dev hsr_slave_0 [ 608.657458] protocol 88fb is buggy, dev hsr_slave_1 [ 608.715855] IPVS: ftp: loaded support on port[0] = 21 [ 608.749111] IPVS: ftp: loaded support on port[0] = 21 [ 609.122040] protocol 88fb is buggy, dev hsr_slave_0 [ 611.422696] IPVS: ftp: loaded support on port[0] = 21 [ 611.667582] chnl_net:caif_netlink_parms(): no params data found [ 611.750496] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.772054] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.779265] device bridge_slave_0 entered promiscuous mode [ 611.793763] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.800192] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.808429] device bridge_slave_1 entered promiscuous mode [ 611.839589] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 611.893741] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 611.944193] team0: Port device team_slave_0 added [ 611.950422] team0: Port device team_slave_1 added [ 612.024628] device hsr_slave_0 entered promiscuous mode [ 612.062355] device hsr_slave_1 entered promiscuous mode [ 612.110540] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.116975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 612.123678] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.130032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.200455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 612.221730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 612.237765] bridge0: port 1(bridge_slave_0) entered disabled state 19:40:33 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0xa, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc80100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x4000) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="cced2f193f9e402f61b87aeaa2d72263fc46e2070e82717b1603ca272e93cd89c0914f3bb0f10e53f1ff49bc02074705fc28e825dde815c24c524ebd5c0cca369810afa0cc7746b6d551c4fea09dec04782f6da3e1bb522a0b3db562885eea5f4fbe33087b0c9ce38c2a77abce9c8e964f53de68b563317dadb160ed95f315d0d80dd09e462b03a93a1661bf55218c7a328385dc9dfb741d40d191a71b0e17cf212b77bfec656fd0a5c7c0f316bdf38fb2e52e5cbc97c8dd0dc9452743f1f84e8016c58b8e66a762a86eeb64acbcb84c5c2a885c0ba695eede7c7ac38d1fafb3cc1493cadd"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:33 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x6, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:33 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xc800, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 612.248800] bridge0: port 2(bridge_slave_1) entered disabled state [ 612.261106] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 612.311803] IPVS: ftp: loaded support on port[0] = 21 [ 612.330708] IPVS: ftp: loaded support on port[0] = 21 [ 612.340348] 8021q: adding VLAN 0 to HW filter on device team0 19:40:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0x8000000000000000, 0x0, 0x2, 0x3}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000001c0)={0x3f, r2, 0x1, 0x7}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) getsockname$netlink(r3, &(0x7f0000000040), &(0x7f0000000100)=0xc) clone(0x2b6a200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r4) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc80200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 612.409041] IPVS: ftp: loaded support on port[0] = 21 [ 612.683492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 612.699111] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.705600] bridge0: port 1(bridge_slave_0) entered forwarding state 19:40:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xcc0000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 612.791009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 612.809683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 612.839513] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.846004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 612.896441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 612.921500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 612.993594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 613.009760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 613.037105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 613.046566] IPVS: ftp: loaded support on port[0] = 21 [ 613.061102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 19:40:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xcc0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 613.092201] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 613.123329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 613.156347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 613.159332] IPVS: ftp: loaded support on port[0] = 21 [ 613.193686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 613.221900] IPVS: ftp: loaded support on port[0] = 21 [ 613.223494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 613.290090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 19:40:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe80000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 613.412093] net_ratelimit: 25 callbacks suppressed [ 613.412101] protocol 88fb is buggy, dev hsr_slave_0 [ 613.417138] protocol 88fb is buggy, dev hsr_slave_1 [ 613.462628] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 613.532068] protocol 88fb is buggy, dev hsr_slave_0 [ 613.537199] protocol 88fb is buggy, dev hsr_slave_1 [ 613.652072] protocol 88fb is buggy, dev hsr_slave_0 [ 613.657232] protocol 88fb is buggy, dev hsr_slave_1 19:40:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="27c088b32fc28a0c8d980a8eacb43f198447ff413aeb2907c044e27b3f92271de2b6f0ec80b8c436c0ed8ad5db8586fc73180ac7cc42908802e85fe6109455b246ed3084c3ad19cb91b701dcff49c9c20bc588d3cec45274460f6893e559551926e4f791d098c1f22854c8551769"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 613.782127] protocol 88fb is buggy, dev hsr_slave_0 [ 613.787805] protocol 88fb is buggy, dev hsr_slave_1 [ 614.642050] protocol 88fb is buggy, dev hsr_slave_0 [ 614.642079] protocol 88fb is buggy, dev hsr_slave_1 19:40:37 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0xb, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe80100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:37 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x28020000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 616.813322] device bridge_slave_1 left promiscuous mode [ 616.818844] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.899428] device bridge_slave_0 left promiscuous mode [ 616.911925] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.949762] IPVS: ftp: loaded support on port[0] = 21 [ 617.186784] device hsr_slave_1 left promiscuous mode [ 617.228973] device hsr_slave_0 left promiscuous mode [ 617.268288] team0 (unregistering): Port device team_slave_1 removed [ 617.279961] team0 (unregistering): Port device team_slave_0 removed [ 617.294014] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 617.337251] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 617.413131] bond0 (unregistering): Released all slaves [ 617.544583] IPVS: ftp: loaded support on port[0] = 21 19:40:38 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x7, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x42820900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000040)=0x6) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:38 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xcf03, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:40:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe80200, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 617.652450] IPVS: ftp: loaded support on port[0] = 21 19:40:38 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0xc, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xec0000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 617.767274] IPVS: ftp: loaded support on port[0] = 21 19:40:38 executing program 2: socketpair$unix(0x1, 0x2000100104002, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x4040) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000002c0)=0x6, 0x4) write$P9_RLERRORu(r1, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES16=r1, @ANYRES64=0x0, @ANYBLOB="e06183f2b515ea347a10f235a831f1032186fe2d8822f01601bad273a27887927ece84fff6ffb5ad4f153f007fcb1b6affd02bafc69d01003b815ab0b5e3846bcf883dc1c142c3d305e61c3dd12a6805329413fbb5e4a0b109ec0c04d733bd0e6789d54412d3a424202296f910b8fc272fe8dbce8337163e58dca4393256443b4dc5a17e457f5647f08d28e9b1d14d586e765123daff23b41827296792503aa69fee131ef8f885337da1faaf462b80e30fa0363c87cda96af0f05459032069ed7e14a5608f3e", @ANYBLOB="573affedc924b07d168e02a7b4f15c7b1d51aacd61b5e9758908a8297280a4b61686de602a9ea1c05d1600bf6fd7a8f591c6bce672d372b940c24f640ad65e57c2df1626cbc040525b93077792b3e5a89850c3c6504cff1af0a829a5480f5586d2609933958e45850e816a2e53bc4c752c230945a60e0c624d514175522b68a79d2ac99c1a9034231c", @ANYPTR64, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYPTR64], @ANYRESDEC=r0]], 0x0) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) readahead(r3, 0x81, 0x0) [ 617.868730] IPVS: ftp: loaded support on port[0] = 21 19:40:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xec0100, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00fb4e010000000035efe5e9b1916c4e76c305eaab5bd2572595a51618bba62b16b050f052da77b904e6122e3d61434f3abae06938c7550c33ef898c7318d06580b2a847c54a7ef7a5e2bcd1a9a5"], 0x4e, 0x3) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3f, 0x80) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000180)=0x3) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x5, 0x2, 0x40000000004, 0x7fffffff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0xffffffffffffffb4}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r3, 0xe000000000000000}, &(0x7f00000002c0)=0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 617.952770] IPVS: ftp: loaded support on port[0] = 21 19:40:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:39 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x200900) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000003c0)=0x3) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2000, 0x0) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x4}}, 0x18) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="ff80b1a63c5001c2ad0f85cce21759d6191a0b08d988b22333aff9641b0d612b3c991a1a3703bfbaedbd0cd7416433cd00000000000000"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r4, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f00000001c0)=0x9, 0x4) getpeername(r3, &(0x7f0000000000)=@tipc=@name, &(0x7f0000000100)=0x80) 19:40:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 618.653349] IPVS: ftp: loaded support on port[0] = 21 [ 618.802036] net_ratelimit: 25 callbacks suppressed [ 618.802045] protocol 88fb is buggy, dev hsr_slave_0 [ 618.802072] protocol 88fb is buggy, dev hsr_slave_1 [ 618.807080] protocol 88fb is buggy, dev hsr_slave_1 [ 618.828332] IPVS: ftp: loaded support on port[0] = 21 [ 618.892887] IPVS: ftp: loaded support on port[0] = 21 [ 619.042063] protocol 88fb is buggy, dev hsr_slave_0 [ 619.047206] protocol 88fb is buggy, dev hsr_slave_1 [ 619.052387] protocol 88fb is buggy, dev hsr_slave_0 [ 619.057467] protocol 88fb is buggy, dev hsr_slave_1 [ 619.523449] protocol 88fb is buggy, dev hsr_slave_0 [ 619.529312] protocol 88fb is buggy, dev hsr_slave_1 [ 620.002598] protocol 88fb is buggy, dev hsr_slave_0 [ 624.162054] net_ratelimit: 22 callbacks suppressed [ 624.162063] protocol 88fb is buggy, dev hsr_slave_0 [ 624.172130] protocol 88fb is buggy, dev hsr_slave_1 19:40:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200"], 0x2) close(r0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000100)={[{0x500000000000000, 0x10000, 0x4, 0xffffffffffff3da4, 0x8554, 0x6, 0x9, 0x2, 0x3, 0xfffffffffffffff8, 0x7, 0x50, 0x2}, {0xffff, 0x6, 0xcfd, 0xc92f, 0x8001, 0x8000, 0x4, 0x6, 0x7, 0xffff, 0x3, 0xffffffff, 0x2}, {0x5, 0x5, 0x8, 0xfffffffffffffe00, 0xffffffffffff0001, 0x40, 0x3, 0x2, 0x4, 0x5, 0x4, 0x44b3, 0x10000}], 0x7}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x10000, &(0x7f0000000040)=0x1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) fremovexattr(r2, &(0x7f00000001c0)=@random={'user.', '\'ppp0.}\x00'}) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 625.042079] protocol 88fb is buggy, dev hsr_slave_0 [ 625.042525] protocol 88fb is buggy, dev hsr_slave_0 [ 625.047193] protocol 88fb is buggy, dev hsr_slave_1 [ 625.052545] protocol 88fb is buggy, dev hsr_slave_1 [ 625.282514] protocol 88fb is buggy, dev hsr_slave_0 [ 625.287603] protocol 88fb is buggy, dev hsr_slave_1 [ 625.287686] protocol 88fb is buggy, dev hsr_slave_0 [ 625.297746] protocol 88fb is buggy, dev hsr_slave_1 [ 629.202024] net_ratelimit: 16 callbacks suppressed [ 629.202034] protocol 88fb is buggy, dev hsr_slave_0 [ 629.202480] protocol 88fb is buggy, dev hsr_slave_0 [ 629.207062] protocol 88fb is buggy, dev hsr_slave_1 [ 629.212608] protocol 88fb is buggy, dev hsr_slave_1 [ 629.442445] protocol 88fb is buggy, dev hsr_slave_0 [ 629.447860] protocol 88fb is buggy, dev hsr_slave_1 [ 629.453630] protocol 88fb is buggy, dev hsr_slave_0 [ 629.458830] protocol 88fb is buggy, dev hsr_slave_1 [ 629.922055] protocol 88fb is buggy, dev hsr_slave_0 [ 629.927171] protocol 88fb is buggy, dev hsr_slave_1 19:40:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet_sctp(0x2, 0x5, 0x84) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x3000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:51 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0xd, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:51 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xdc02, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:40:51 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x8, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:51 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7fffffff, 0x800) [ 630.956803] IPVS: ftp: loaded support on port[0] = 21 [ 630.957857] IPVS: ftp: loaded support on port[0] = 21 [ 630.986075] IPVS: ftp: loaded support on port[0] = 21 19:40:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:52 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff84"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r2 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@alg, &(0x7f0000000100)=0x80) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x4, 0x0, 0xffffffff, 0x3}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x3ff}}, 0x7fff, 0x800, 0x0, 0x9, 0x18}, 0x98) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x5000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x822402, 0x0) 19:40:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x92a3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x7, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0xffff, 0x1, 0x3, 0x4}}) close(r0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 631.750075] IPVS: ftp: loaded support on port[0] = 21 [ 631.793238] IPVS: ftp: loaded support on port[0] = 21 [ 631.889946] IPVS: ftp: loaded support on port[0] = 21 [ 632.523023] device bridge_slave_1 left promiscuous mode [ 632.542170] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.632441] device bridge_slave_0 left promiscuous mode [ 632.638135] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.917368] device hsr_slave_1 left promiscuous mode [ 632.982217] device hsr_slave_0 left promiscuous mode [ 633.029844] team0 (unregistering): Port device team_slave_1 removed [ 633.064617] team0 (unregistering): Port device team_slave_0 removed [ 633.112048] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 633.177972] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 633.381323] bond0 (unregistering): Released all slaves [ 634.266879] IPVS: ftp: loaded support on port[0] = 21 [ 634.558587] chnl_net:caif_netlink_parms(): no params data found [ 634.572053] net_ratelimit: 21 callbacks suppressed [ 634.572062] protocol 88fb is buggy, dev hsr_slave_0 [ 634.582199] protocol 88fb is buggy, dev hsr_slave_1 [ 634.680746] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.722084] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.729373] device bridge_slave_0 entered promiscuous mode [ 634.770037] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.776897] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.811367] device bridge_slave_1 entered promiscuous mode [ 634.849627] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 634.859182] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 634.891464] team0: Port device team_slave_0 added [ 634.900704] team0: Port device team_slave_1 added [ 634.956717] device hsr_slave_0 entered promiscuous mode [ 635.022421] device hsr_slave_1 entered promiscuous mode [ 635.077980] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.084386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 635.090991] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.097426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.195261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 635.232243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 635.240032] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.267687] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.283992] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 635.308170] 8021q: adding VLAN 0 to HW filter on device team0 [ 635.336606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 635.351139] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.357548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.432849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 635.440523] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.442047] protocol 88fb is buggy, dev hsr_slave_0 [ 635.446909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 635.452033] protocol 88fb is buggy, dev hsr_slave_1 [ 635.458608] protocol 88fb is buggy, dev hsr_slave_0 [ 635.468533] protocol 88fb is buggy, dev hsr_slave_1 [ 635.502957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 635.520346] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 635.558394] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 635.602097] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 635.609446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 635.640587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 635.654879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 635.675329] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 635.682053] protocol 88fb is buggy, dev hsr_slave_0 [ 635.682949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 635.687131] protocol 88fb is buggy, dev hsr_slave_1 [ 635.698628] protocol 88fb is buggy, dev hsr_slave_0 [ 635.703731] protocol 88fb is buggy, dev hsr_slave_1 19:40:56 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0xe, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x7000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:56 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x9, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:56 executing program 4: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="e558d312b490b58679e1080183177a205175811fa79501172a3bd7e869a7e0130dd886e217297ee3000bd058b73ad6c4f8ae7418c090df633a2d5a98a0edb98254b49799ebf7944c2b2febe3b8cf3ce2a5", 0x51, 0xfffffffffffffffb) r1 = request_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='!\x00', 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='keyring\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r1, ':chain\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) rt_sigqueueinfo(r3, 0x34, &(0x7f00000003c0)={0x16, 0x5, 0x6}) r4 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x8001, 0x2040) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f0000000300)={0x29, @rand_addr=0x10000, 0x4e22, 0x2, 'sh\x00', 0x19, 0x8, 0x37}, 0x2c) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00'], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:56 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe401, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:40:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000100)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 635.994162] IPVS: ftp: loaded support on port[0] = 21 [ 636.008524] IPVS: ftp: loaded support on port[0] = 21 19:40:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 636.108991] IPVS: ftp: loaded support on port[0] = 21 19:40:57 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x80001) pread64(r0, &(0x7f0000000100)=""/201, 0xc9, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0x5, 0xffffffff}) 19:40:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x9000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xb000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 636.833687] IPVS: ftp: loaded support on port[0] = 21 [ 636.877246] IPVS: ftp: loaded support on port[0] = 21 [ 637.207709] IPVS: ftp: loaded support on port[0] = 21 19:40:58 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0xf, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:40:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 637.552758] IPVS: ftp: loaded support on port[0] = 21 [ 637.826352] IPVS: ftp: loaded support on port[0] = 21 19:40:59 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xa, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:40:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="92b9f7e97e97e17da5a9d64e9e8c7e80"], 0x2) close(r0) mknod(&(0x7f0000000100)='./file0\x00', 0x200, 0x4) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:59 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x5250c0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x1f}, 0x80}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e22, @multicast2}}, 0x4, 0x6}, &(0x7f0000000280)=0x90) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:40:59 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xe603, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:40:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xd000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:40:59 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x12, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 638.941154] IPVS: ftp: loaded support on port[0] = 21 19:40:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = msgget(0x3, 0x91) msgctl$IPC_RMID(r1, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 638.989265] IPVS: ftp: loaded support on port[0] = 21 [ 638.997724] IPVS: ftp: loaded support on port[0] = 21 19:40:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000100)={0x6, [0x9, 0x5, 0xfcb, 0x3, 0x1ac7, 0x100, 0x1fffe00000000, 0x1, 0x1f, 0x100000001, 0x1ff, 0xffffffffffffffaa, 0x5, 0x4, 0xffffffffffffff00, 0xffffffff00000001, 0x1, 0x7, 0x10000, 0x8000, 0xfffffffffffffff7, 0x7fffffff, 0x6, 0x6, 0x0, 0xa3, 0xffffffffffffffe0, 0x2, 0x7fffffff, 0x2, 0x1, 0x8, 0x5, 0x20, 0xfffffffffffffffb, 0x1, 0x800000000, 0x200, 0x5, 0x8, 0x5, 0x5b01, 0x363, 0x401, 0x5, 0x43, 0x100000000000000, 0x1], 0xf}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x420002, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x2) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xf000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x10000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 639.602022] net_ratelimit: 22 callbacks suppressed [ 639.602031] protocol 88fb is buggy, dev hsr_slave_0 [ 639.602044] protocol 88fb is buggy, dev hsr_slave_0 [ 639.607047] protocol 88fb is buggy, dev hsr_slave_1 [ 639.612082] protocol 88fb is buggy, dev hsr_slave_1 [ 639.827431] IPVS: ftp: loaded support on port[0] = 21 [ 639.842032] protocol 88fb is buggy, dev hsr_slave_0 [ 639.847162] protocol 88fb is buggy, dev hsr_slave_1 [ 639.852317] protocol 88fb is buggy, dev hsr_slave_0 [ 639.857373] protocol 88fb is buggy, dev hsr_slave_1 [ 640.066178] IPVS: ftp: loaded support on port[0] = 21 [ 640.106795] IPVS: ftp: loaded support on port[0] = 21 [ 640.242044] protocol 88fb is buggy, dev hsr_slave_0 [ 640.247195] protocol 88fb is buggy, dev hsr_slave_1 19:41:03 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xb, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x600, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000040)=0x1) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x11000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 643.129230] IPVS: ftp: loaded support on port[0] = 21 19:41:04 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xec00, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0xa, &(0x7f0000000780)=[{&(0x7f0000000100)="a15ab930949e3e04", 0x8, 0x7}, {&(0x7f0000000140)="530b289a27196efeb956f2037e02a6e46d0c8a87f05444161ccdbd28dcd43e63c02a39dec13c2e2773a1ea203ff2adbcaadbf86eb635c360fd8580b89fc2b463875c74d6d14b72b0ca964794997ff0a3534a867ce8dfe62adf62ce13887e21c278da07b60abf3683c748f96dea83034a6cc58c8d49a12100f8251ec90a26456f6ec2ed9316cad5fbde3b40ab928a5ff46fac9d9c051d9aacb41813145bf72398d5b2c7b425fc7ae18976028d887551", 0xaf, 0x88}, {&(0x7f0000000200)="9c98463fe18975e736da53b4df989ff9a18e83390e6376b8482c6d101d8deab610d35f8c62fdc40b4b8f6ba74a6cfcb6a9ff2e46fc86cb65dcd0ef780851245d14737b423b1586619efe9d9319eb0fda513f4720f38d8b1f1c558aa6e9ea1b377089695c00825bea53bf3817e6b2e24c75894f8183919db396cda65993f5eb7e01490cac2ba7815d8d0a94826a81ce97f76b2462a2fa8ef5a779bf7495965fee8057535a46cb9cf39110290d1d3ea218b1465c902513cd8f0aae80baab3ef13e83f0019c1db4e3970675cfbaecc5ad393f5d561b521401784a54f2", 0xdb, 0xfffffffffffffffd}, {&(0x7f0000000300)="90e66326de7449cee3bf1187993eaaea783c712e6f88e2b12a354ecf928f66a8cf5b57ac6d43c5593ad266d16cd3f0b93ac8f77950c6bdf0a336dccadd211c9ec3dc088ff4aeb849ef9396cf1562c4eb6f", 0x51, 0x1}, {&(0x7f00000003c0)="0289c812a58cf89dbbc00ca4e3", 0xd, 0x1a7b}, {&(0x7f00000004c0)="82636eb4c8ca5b4ae906e4a1baa6bb11c8f187726f88c2b2a8011898b883f136ad574407db31dc9efd4aaec455864f257fb16d7dbe0dd2b4c3e5a6df54eaafae2351ecaf22b8473b2920a986487d61e1a4bb514e991d41a1d9e3934fb5e084d556012b38a87e18017e52345a70d5d92230cf88d3f8c9e86fbce8d2b19228a330f44ad95fbe90742c057d4dc333baf8fd19cfb69b5eed21253ed4", 0x9a, 0x20}, {&(0x7f0000000580)="b77164f131adcaeaf1e96752336999fee909763fec7060b816178bfd502cd2a5c472fad10efb5bd35ef68a9dfbe08037653b3e5ad4ba7931ba061ecdae2822d0783c924abd67893f4ae7297620e392af34dc705c6c0a7d6b5288a71a80120d33cb3614d297219596912fbc49a57c0cd956eba31d102982a5dd424829f41f2b6840ba9bf5d2cf36ecce", 0x89, 0x6}, {&(0x7f0000000400)="50526a9d84e96a46646e54b59521057dd3598ffd4bbd150a03f4c8", 0x1b, 0x400}, {&(0x7f0000000640)="da55142f83d788c482d43246706beea8e88ac3fecbc03e49e1d6d85c168b67b62fe8303580d0f9255aa5c16c3b6ac5704202b2d351b2db354f5c9bcb36ecc825f796864be5bb9fde5b9f135eab42d8ad96bbd43331", 0x55, 0x836b}, {&(0x7f00000006c0)="ff4fec6d03a230c3e2597d678df3b7f7f998ae51f699088d996ee0b53dcae8ca8bfbc0090d9e54e1b84ef482b0b09030bc6785282311f46f5e958c49afec85602e7d7811d9889214ef5c54c11fbdbe2286a1594cfde2ee50eadb69b9a00efb6d0d69886602652075846d73852a1da893c146064d83ff5ee6ecd027bb5dee72e4e566660502306c775395f8d4c5f8", 0x8e, 0x7fffffff}], 0x80000, &(0x7f0000000440)={[{@fat=@codepage={'codepage', 0x3d, '864'}}, {@nodots='nodots'}], [{@audit='audit'}, {@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, '/dev/vhci\x00'}}]}) 19:41:04 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x13, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x12000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) close(r2) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfd1c, 0x0, 0x0, 0x1e6) exit_group(0x80000000000) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r7, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000001c0)={r1, 0x6, 0x3ff, "afdf1584983c5908df7097677cb2d06a40c0ab22f2c3517b20a0bb4aabe16d9e3cf779a1eff507856e1980de46d07f89f6cc29dda8d8a869842f4b4f31821a949d58f6973ac6419193db972d89d019ca459a07df1ea6f41dc69c0b297c5db98f0f990c7d8fb2cd4c0682668d5f78594f8263f6271c372b5a2ffc27bfbd468e438a09adef845ee1fd6878f288720e4cff3f38b0857afe19167226e50d01dba084c75615db768600e0fd30ea"}) close(r7) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, &(0x7f00000004c0)={{0xa, 0x7, 0x1, 0x103c, 'syz1\x00', 0x7}, 0x1, [0x4, 0x0, 0x80, 0x7fff, 0x100000001, 0x100, 0x7, 0x100000000, 0x100000001, 0x2, 0x10001, 0x9, 0x4, 0x1, 0x2, 0xb9f, 0x800, 0x43b, 0x80000000, 0x32, 0x2, 0x5d5, 0x100, 0x8a9, 0x9, 0x3f, 0x4, 0x9, 0x4, 0xe84adac, 0xc34, 0x9, 0xffff, 0xf58, 0x2, 0x4, 0x2, 0x1000, 0x2, 0x3, 0x1ff, 0x2, 0x1000, 0x464a, 0x4, 0x7, 0x1, 0x12, 0x5114, 0x100000001, 0x7, 0x2, 0x6, 0x6, 0x8000, 0x5, 0x2a5e, 0xff, 0x5, 0x9, 0x4, 0x6, 0x7f, 0x3f, 0xfffffffffffffffd, 0x8, 0x26, 0x7fffffff, 0x89ae, 0x7, 0x100, 0x5, 0x7ff, 0x2, 0x5, 0x7, 0x0, 0xffffffff, 0x10000, 0x400, 0xb07, 0x2, 0x100000001, 0x1, 0x401, 0x4, 0xfffffffffffffff7, 0x495, 0x9, 0x5, 0xb3, 0x9, 0xd53, 0x5, 0x4, 0x2, 0x1ff, 0x9, 0x9, 0xb7c, 0xea, 0x0, 0x10001, 0x89ac, 0xff, 0x8, 0x8, 0xffffffff, 0x2, 0x8001, 0x200, 0x0, 0x91, 0x7, 0x3, 0x3, 0xed6f, 0x132243d0, 0x1, 0x0, 0x7, 0x4, 0x9, 0x1, 0x2, 0x1000, 0x100000000, 0x20], {0x0, 0x989680}}) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xb, 0x30, 0xf43, 0x2}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000140)={r8, 0x2}, 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 643.496310] IPVS: ftp: loaded support on port[0] = 21 19:41:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x452440, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000100)={0x5ca24827, 0x0, [], {0x0, @bt={0xffff, 0xc7cf, 0x1, 0x2, 0x9, 0x17, 0x10000, 0x92, 0x6, 0x3, 0x83, 0x1, 0x81, 0x0, 0xd, 0x10}}}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x13000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 643.661467] IPVS: ftp: loaded support on port[0] = 21 19:41:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x2, 0x4000000000200) ioctl$LOOP_CLR_FD(r0, 0x4c01) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) getuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @loopback}, 0x10) creat(&(0x7f0000000400)='./file0\x00', 0x80) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getcwd(&(0x7f0000000340)=""/35, 0x23) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) 19:41:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ff807a13adc22956f0be06fa84708b19407291087f579ccc06d58d90a1b13a35abda69653eef84c5e99a9670deb8bf8ef9c3c7df2b966849053877687e011f2ebdac4eb0591cdb9e1ea6f5d3d6bbac10758aa3c2"], 0x2) close(r1) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000100)=""/234, &(0x7f0000000000)=0xea) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0xb971, 0x415, 0x1, 0x4, 0x0, 0x1, 0x4, 0x0, 0xa7, 0x2b, 0x1f, 0x1, 0x2, 0x400, 0x5, 0x1, 0x0, 0x1, 0x7, 0xf26, 0x3, 0x1, 0xfc, 0xfffffffffffffffa, 0x3, 0x9, 0xffffffffffffeb3e, 0x221, 0x8, 0x7fff, 0x4, 0xa70]}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 643.876306] IPVS: ftp: loaded support on port[0] = 21 [ 644.366274] IPVS: ftp: loaded support on port[0] = 21 [ 644.484907] IPVS: ftp: loaded support on port[0] = 21 [ 644.962069] net_ratelimit: 24 callbacks suppressed [ 644.962078] protocol 88fb is buggy, dev hsr_slave_0 [ 644.972185] protocol 88fb is buggy, dev hsr_slave_1 [ 645.842030] protocol 88fb is buggy, dev hsr_slave_0 [ 645.842035] protocol 88fb is buggy, dev hsr_slave_0 [ 645.842096] protocol 88fb is buggy, dev hsr_slave_1 [ 645.847243] protocol 88fb is buggy, dev hsr_slave_1 [ 646.082033] protocol 88fb is buggy, dev hsr_slave_0 [ 646.087237] protocol 88fb is buggy, dev hsr_slave_1 [ 646.092413] protocol 88fb is buggy, dev hsr_slave_0 [ 646.097558] protocol 88fb is buggy, dev hsr_slave_1 19:41:07 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xc, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:07 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2410}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r1, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x4, "d8ea50ff"}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000180)={r4, 0x5}, 0x8) write$P9_RLERRORu(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff0051fa870490e09dd1b66e90ab1b6d5cfd7c40df1e44ba13ddb60ef96769fb41dac67e885b3dca96fcab92e75a6f6488df3f7cbc802e2b9be0325387b8b9dc9d5f0a69693de65d8d021b5504a5d9c169777c4d3a77c053a1cc0d0f0fa1a0f7ef392f"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x14000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:07 executing program 2: socketpair$unix(0x1, 0x200000000000003, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0079702c374e4363d6a0db0d43557be1e4de9a717eb38b0803bd5296165b0039108733c071f29d131adb78613160718d1111bfda849756288b816af0bca235014e0354a67189ee5f097ad8914d1b67911f8744c1d8f738821a7d39ef3407d1eec7780d3b8569dd270a8ff61029ab5c29e10d1e25349daa917372ee4ca0570aa940edd2bd96fab8ee7aaf75e33d6cb9099117ecd23f631fc2d931c8a710a78b5c4ae181b23fbdbbb6ef1844ca495dcbe2b11051682d4ab3296a5d5e58f94da6f34bbe965de49e"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:07 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xec03, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 646.642836] IPVS: ftp: loaded support on port[0] = 21 [ 646.725424] IPVS: ftp: loaded support on port[0] = 21 [ 647.233464] IPVS: ftp: loaded support on port[0] = 21 [ 647.249222] IPVS: ftp: loaded support on port[0] = 21 19:41:08 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x14, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x15000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="fd00"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x240000, 0x0) bind$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x24) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xee03, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:08 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xd, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 647.736703] IPVS: ftp: loaded support on port[0] = 21 19:41:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') socketpair(0xa, 0x800, 0x100000000, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x18000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 647.765023] IPVS: ftp: loaded support on port[0] = 21 [ 647.853672] IPVS: ftp: loaded support on port[0] = 21 19:41:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x3f000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 648.614975] IPVS: ftp: loaded support on port[0] = 21 [ 648.629384] IPVS: ftp: loaded support on port[0] = 21 [ 648.660540] IPVS: ftp: loaded support on port[0] = 21 [ 650.002051] net_ratelimit: 15 callbacks suppressed [ 650.002059] protocol 88fb is buggy, dev hsr_slave_0 [ 650.002095] protocol 88fb is buggy, dev hsr_slave_1 [ 650.007391] protocol 88fb is buggy, dev hsr_slave_1 [ 650.252094] protocol 88fb is buggy, dev hsr_slave_0 [ 650.257202] protocol 88fb is buggy, dev hsr_slave_1 [ 650.262352] protocol 88fb is buggy, dev hsr_slave_0 [ 650.267413] protocol 88fb is buggy, dev hsr_slave_1 [ 650.642073] protocol 88fb is buggy, dev hsr_slave_0 [ 650.647407] protocol 88fb is buggy, dev hsr_slave_1 [ 651.202097] protocol 88fb is buggy, dev hsr_slave_0 [ 655.372143] net_ratelimit: 22 callbacks suppressed [ 655.372149] protocol 88fb is buggy, dev hsr_slave_0 [ 655.382262] protocol 88fb is buggy, dev hsr_slave_1 [ 656.242152] protocol 88fb is buggy, dev hsr_slave_0 [ 656.242294] protocol 88fb is buggy, dev hsr_slave_1 [ 656.248643] protocol 88fb is buggy, dev hsr_slave_1 [ 656.482149] protocol 88fb is buggy, dev hsr_slave_0 [ 656.487274] protocol 88fb is buggy, dev hsr_slave_1 [ 656.492408] protocol 88fb is buggy, dev hsr_slave_0 [ 656.497477] protocol 88fb is buggy, dev hsr_slave_1 [ 656.882127] protocol 88fb is buggy, dev hsr_slave_0 19:41:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x5}}, 0x18) exit_group(0x0) userfaultfd(0x80800) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x20002) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000240), 0x4) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x40000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:18 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000040)={0x1, 0x0, 0x101, 0x400, 0x5, 0x3ff, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/11) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:18 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x15, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:18 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xf203, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:18 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xe, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 657.439740] IPVS: ftp: loaded support on port[0] = 21 [ 657.472260] IPVS: ftp: loaded support on port[0] = 21 [ 657.479897] IPVS: ftp: loaded support on port[0] = 21 19:41:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x40000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:18 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="f80000d63b78fac49349e45555e197a25dc83c2057197bd8a59dec508449e7a6ceb5efec8ccb755ee1c2fb402fa8744ee3ccd4d18f60547adf4a13402f567e2bfc50822a8f98231f2e4f0d9680a4c9126eafdc8c000000"], 0x2) close(r0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x101000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="00020000", @ANYRES16=r2, @ANYBLOB="04082bbd7000ffdbdf2513000000280007000800020003000000080002000200000008000200030000000c000400ff000000000000002800010008000300ffffff7f0c0002000800040002000000100001007564703a73797a3100000000100007000c010300ff07000000000000bc0004002c0007000800020001000000080004000200000008000300080000000800020007000000080001000d0000004c000700080004002000000008000400000000000800010014000000080004006a040000080002008f6f000008000200000000000800040002000000080002000700000008000100170000000c00070008000400080000001400010062726f6164636173742d6c696e6b00000c00010073797a31000000001400010062726f6164636173742d6c696e6b0000340009000800010040000000080001000100000008000200010001000800010000000000080002000000000008000100ff000000600005004c000200080001001d000000080003000100010008000400ffffff7f080004000300000008000200cb37ffff080002001f000000080001001f0000000800030007000000080001000e000000080001006574680008000100756470000c00010008000300010100002400060004000200080001004b00000004000200040002000800010003000000040002000c0002000400040004000400"], 0x200}, 0x1, 0x0, 0x0, 0x4000000}, 0x48005) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000100)={0x2, {{0xa, 0x4e22, 0x3f, @remote, 0x4}}}, 0x88) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x80000000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r2, 0xfc00000000000000, 0x6, [0x5, 0x1f, 0x4, 0x5, 0x8f9, 0x7fffffff]}, &(0x7f0000000240)=0x14) close(r0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:18 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="ff806fd8fe638e0d030000007c0a21b399829dd360e904294aa436e34b4ccd504e5e0042bf4cbd551be7f59e8d594e2f2f7a09fb2cfee9b99d9398c067dea35f6cb770ed59eb2f6cf08b63f456797e8ce326600b5602ce8c387fa14728e693e816f25bb09c9ced5b0fd585d3b84062b739e10f4d77946eb916d7ab99981de9b32c259ed50c488002c9150ea30e453c0781f61a9b684a97df7bb9fc903e201615a6024356fbc936e00ac9a5bbf0e4f3baea4bb31ef2ac3a1127906cc452b913ba95a2d1e9dd"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000000)=@ipx={0x4, 0x522, 0xa09, "8c69682ecd2c", 0xfffffffffffffffb}, 0x80, &(0x7f0000000200)=[{&(0x7f00000004c0)="25f3925e42abf0d97bdfd5371dfc99239f9b1551ed4ca0f3fc6070d22525f178a079fd418e68318ff882cee40622de848381b337c2965f8adc6443020e979bc96e6b3da5bc68da7ec6515df479c3a83126868e216f36fc8f6afe4aa0d7970964f208adf746a66aa48faf7c07d6012b4e5705d6fbe0d2fb9b41666e828a8956c3fbf601db8326dbed071269f17e03eb2e7c6ef88c02544fbcab95f4b98029e75b39888c7b2246173db61ea34aea6f55c4791b24237069c93594855e6d45b5d6724ba8e788ce929621668f014a559bf45d4314e418176f321df536160c69452aad0b65a7d8d39e0e011c0d4013cc5bc591abcd0d40581807280235e56b3eff54e10b173ae12429c2e0d39ee320f53acbac695448a8741a24a273060d7c9b11fa79f8e90721fb1a6a59b48b81d3f19d4e63944db3f7fc076b89c150612e929efbddef128f97cf9becdb95fd18dd84acfe0d9cbb5442ce060d1062129e2b45c722a83e260219ad9197abf03a455f1e415e401d5daaa2d90e45e69623e5841706a80c1fb13b5e3e9f1fb9f15d4d9eb1049351f0f9e0bb7916be9b54e6b6c85e3574d887679d657c8db843122413819da689f2b13b5618b3a2e75f669db18c61ddca06611508803245ef9ceed5e715a727c524eadf16a09ea63d30ba8379b4777a3aca698c95e7e12d7dd62c3a721e8e5fdf0cad260110236a7e89ba189e7e34e2716c93ef2309098ef912f1a8f1d55031b93f2dbe362d8d5f3aea70406236d908f4614e3a3e2540facfcf97119467cac5e95d4eb1dada829852c6eaa4c1cae4a1363e4971a2468e9faadf74ec5eb70e84b2884658405cc4abbaa670bc8b972cba9b24012f1997edbedf88ef3849bb27deeac1445477f0654e85940b610c6a8510bafeba1a9e380a0b9e3e686407eca7f68a2b8dd3e8fdf49e29fb1d345f5c354dce01bd2d9f9c23539485edb2da2f8b06679a5e15890d9c781d22425cc4ea19a60a7bfb5f339dbf1d46760ee2a4878e8d2b210c3711e8522ee130025c58729ffdebc01becbb99c7799345422375f7b862a9b6386219973b30e9296b21f4f24775bb199439a124563aa835a75e6388ee8aa7ea87b8129373d2c38e975015368b27a404e7154705bf2481a179718bb7d2ce653875335355947317c405ae1efeadf473f4c2f689ad7990996fd32ab88d26a933e20b56b2fb5f96c8ad155a589db76266be9f81396586878b8e4454dc80d1f766047849d88eb21261528ffdb4e5cc2257e2aa4b75720ad0a7391f8d35fd08d3734f4b6d129b3f75955f8ec9929a8aa2d37a3d1d6bb899e179bef93612e308335b6bbc12706da33163f7978bdd1ff7adafa5c0612e379f33230e5c88bce32c77e728d9a5010dac0403dd9af467bc8d36994bd34895508872e7d28d50fa0a76324fdbbafba834b08515e82bf8ecd42d2c3a301ed6c89525f374fb4d7ea29199d1686c55eb5254c63e990fd259eac465b8910800903845d9626fb1647e66bc5e514b8ee4feb5e5abfd543b25f22602320c99cfc50b1a3483124944ff77ccad5d8c00201bc406ac18f819538772a9ed709815c7d22e60bc8a58a9b955062fa9cf70a2947dd6afc6c4c171fbcea68ab689c658b43eb66f188881e2f96423647eabb67fa6938426f80a5d9692dee057199f3f12bcc0eeb4a13bea540a4ced81a11f3d2a1ad27d7a2f635487e97a85cd3e9da3575c9ad6aa5d2c83b9532fe04605fee16ff3fa3851948524c82e6f68f342f3e775a24377de0c194a426c41a2e00eb31861271ebc468aeeb16e0507edad2f5745330c095998cc88440a029a062877db94c69846a8e4640e4216b7581269bc38a44d64cc898811720db4a8f276e0785191da9d3f12788b74ba93720ebcf005ba4911667ba0987c5f3f42965f9beade64dcc3d131dea256656d3cb465f36a142319a6945abde85de7c12dc1b1eafb977817829d7fe5c2d38f4de6400a6a3dbbd0737589a9c4db6feb4562ea6d595e5c85eeffcee8910c048ba046e7a7832111731eab429d1d32a088a4cc6abd966d7ec3d3221d1373e9133703976964a58a380385fcca9c0ce200b7eee2cb3e57069f3504a8d0a672645c708dd54850e3c6132755c41a3f70ab5b642d5ee7bba566fb166736c11055121e81afaad136d33c6bb086929e448974df6b6870673b19d1b663b2b0f01e79c73bfdec3ba28d78261f258a3a87f975df83983150723f15f596331fcd2609ce96341676ea4f9c59336eaeebdcaee5d56300fe5b8c21c208c667370925cc6223d5480275276d8f4b6f170a9e0ce1a8f974c74ada688a33078404e58c85fb7fac12ae9b80d0001a9baf60500920832db82b9b36feff4abf70279b0c1c0259885eaa876c3f8188dd935c91691ebdc5d903c69017d4e4465f73307f9e733fc606a3ca4a98a2f754dc6683de16d99af44c742f736be1bcec70944e5aa9a6197aa04bd2a7c228eab172c80e8f668eb9e787158bedde52863a6cb56271c9a6fc589e6568b6b9fbc03cc713be063b2824f7afc5f64e08d6b9f6beb8745ba8dba1651cbfb9d734f352ebed09576f5abb0f4bc6c9d7f3beb6406b83d37d2401957e35c04a0965a86060c0db3357e97da9c2109ee8dab07e59e32bf17c68e6861012fa6a2c6051b26c60930e70381ead6b152e25faef5d8d0d77c274b7c34bacd137538a8c5e820a6092c19c9cc4bda933f0528408be84bb4f28c377fb1400f22aa76096a5449f56c9700d06b075e1e51e827dfa20db0ac6aed5e023c772c06d2cefefa47c592cfd53894939ca87539844089983ee01b10cc664a83ed7fdfbf5997619da0e47bec15221c757ad4f1fcd1e2fc33f7cbbbeed2513580bd125937e655da1799419168d253a2ebd8ec6d69074e89976d106f05a85657dd3359282d95d46386a98d82e519f401d9c49f178e1a4a53e71ffbf70c617bf9042f3a88d73028cb5bd2a25478194ff904e49e6a479c5afbda56ba66e9307471c65422e6d51b46ad366b1065c5f282a1aff2de8196d19ae5684de0bccb922d49cacdf269cd15d5b34a8ed35ec49c9af053a9ad6e8d5e65931c86a10f6b45bd3d2d69233f7dc765afa211b3dd5fba59fc51daa69c3ebced88d36f9a642fae3ea3316cd18adeb0aeae4a0cf68de7fed1c652b92df7d5f7a0d98e91844a40766ddbc51becf6ddf1e3f8846959d9c31ddc67e44ed384e05161ca3d205aa7ebcc19ce1377f495c3bd078b821e90327fd6eadf1eb67628eb13c2b37a4402430eb726b9aa1ee0e644acf3aee3d401c9f9351d942e45613a85b735292ac9a0c440f0e8cb0b1eba39a1efb1e468a44a68299b1c8315950820f1c2ce913ca4918049908cf6b46b1bbb04b761e4e230d21606954430f3024496a9575ac19985dff0e32181fe9d2748990f40f7fcb153db63fbf0c0dc1a5044e8057e0a921fd7fe1f4a2893432d9b8bed77d541b197bd1cfb856151baf052e7bb0a19f87f8e2fbcbbc2edfd190418590f0d3fec943b9964a59ae5b76f9a34eebc518003910de902cf6ebf6b0901ceedd8b4e96cd9825479b4f0499277959157b78a0d071c491041a58ec5aa03d7a59ee2a78ac76b24916a401472dcfa391ad612e7bbe4d72d8fdf3cad6d34fd0b95e28d0baa12bcfb4fe6c218475bca5642942a6a95268bedd3ef12865f7fa181ae2520941d18d2ca1f458cd9731d5e35e010a71b94ebe5dc3450294a7ac09d4027ee3007579cd62a7e45fa629d3378cfa0c874b24340f941f29fe7be5ced21645c2a722c7dbad17b2718b50ae7336bb33c3ed6b359a4df1cad5ad7c567e9c50b44e91c182e395664c23c66288a21a837bc05d389d2d11c184223f63c09e3281f1339bcd640c72eda9e9572be559f9d0be299efe0a82544e21c463047b83f823d9c9eabd237335e1fe147c76bf9afcea2bf3d7b372a7c89602353d50aad86bfe0c8c0d58effaca92dfced916fe8b1fbde8e41cdaf95139acacef599fe43260e571aa5a4c3966a3ee4141dc73b8f2387b6398db874bc83914e8f9a3738861310d63349722c5e9dbaf547ada23052c763f06523058205e7560314c72158e34130d63a75d46413207e047c76c0002549ef53c650c953ca0b172a2cc154b18946dd97b0871d11b5f234dd43bc992cdbf10b66d596b02961a6e59b1beb69b5e3a24e7a6d75e0c6754e1d7367158462e1fb0f5a1375daded6cf760b06427606b570e60343770a8aebb7b35cfa682a8b703ad62a63b9e314211260b4aa9f78a440442cb4448ba930d8a4d6a8bd804221189449e28274a429dcc953360df081ffff3cdd5a3e9cb55088ec14367d2ee9465c687702d883caff876f3ad8dab8a08f5cf1b614379d5f0d8c395f243f74908fb5b2b04345d6f724c7277827e6e38c7696883556a4123291e19605e5c8348a70dafdb8b23dfac37f236ad6cb36ed3c67ea56af098f57da9049611be76d64db9425ed7a5bac4d6d9048fa5e0de3b9142d3522557536435c736686f65710fee99c0d439d202bdae1a24841d008bc6632e89c8d82a99c063add424460f4d098c4dcd341e82e9b148175b26b2a51c3805fff337f3b2738537d327bbcf9f44100a5034a2e4086dbc8294ddbe4f9a5fce216877891af2254d5d650df028d87cd6f9a6fe7ac0758f32b3ef2e5a7b174039555ba1add9f9ecb9e9cd263333e256264291c11a76489500226882194f4566a735ae32974879a4c855a1bb6b639c96e5d77061eea0d98be277df722d11b6b7a6fbc48bf37e04ce1f1a93e682537596fae4f7626653ae4941f595d1e6af629499d3f28078aee81731389b32bdc98d3b8d84d2529d6353d5b5d076fb3d43bdaecf7631eca343494f15100f3fa77de721baae49350ccd88ef2eec808f6f7d575e148376fbf2e29d0699df7403ff33717b66ea695b0007de7dc918830b4984785bbf1f1b81e041812a47f78a4a6207f96c89380754922c3018801a7473d82e716b5a5b23e5a27b5f10de8e9df3000b24d62860ef288840884c904ff47f7b49d997337258e12262674ded3e1b441031b1889880837b51a37b304a67d7391e94e3477d87aee9cf7bab7f06a8d024fd4e1eece950edb2dffaeeb442fa97b3e176ae468e701b74a4b9e52145768469bf989c8fbcc90d4ecf91a62c1861b85f7cb5b3549f1ae4eb2f3bf6981497fd23932a1734822d39b907e9db7054e13012256a5739c59679a26dfea7ccaaa5a83a903087b4f7d7718c18a778a6be875d81b62afc55598218b2b96137c912580b9af0ced9dba6bc9026d77d067db3d1d2abb16ce6e04f2c680ec6f0a0d4fb731d191d07fa4fa87962795985fc460120fc19ef42e635fdcc0c5979e980944d4750dde33ea0815af31cf81e747e1dbff8b221110196eb3956eab701b3d948af3d2418c68b97e324803f8cffa54c1996049941f6b54eea8d9874bb6f041700681d8f9308bdd8f352cebb50cdd8e868029a858f7498aded0d52c777ccd21f3b12a80788dbbaf3853f346e96351a4817d535a4dfe5d7d9d5e4176aba28c87e6016e588ec935e0bda9731dbff6178d1f6ba7d191673d991be6a3160d101818ea4c5f69c9b76c2003c1035f86742478a89438917d64b47e72db0bc63640b1d7697c0526ee0d52bc0f73a51e57e0568aa79bea82af249536373af993d09d4bf9538b54f048f743fa77464217f067219c555a4726e5b5ddab6cac5da6505bda2d41156105fa497d664a0e34701182701d9ae81ced7c05a3a9cb404d0ef0fdabc7b18fd34fcb255827dfcd6a2b2eabfe031a36132496d9c3fe7", 0x1000}, {&(0x7f00000000c0)="0220ce81cf9310204efb49f021d72395ec06e79f1c971add9168c17a29324f75b35dcc2de8c6f6a08e869a986ed54dfd7a50b7541eaf8b072883d2b45227f7", 0x3f}], 0x2, &(0x7f00000014c0)=[{0x70, 0x114, 0x1, "72566793bc5ea3f9c9c8ed1fa68076a58961451aab7a0df8d79f8ba1176592c57a0e57e33fcbef35d09e5da97e1224088fad2caa9c212869cfffc8f3d76fe7d6a4f7bd0a32f6b2498ef979b1ea95888060111e3c14bafc00be10bbccbd1d6087"}, {0x100, 0x6, 0x5, "19e56129facc786d0bdec3ec0419e66ffa4dacff8be48fada236677dad35489399b49215ce932cbe23fcf9bb7a5ecbec068c68c78e3416437195f6c68de1392ee9cfdfad1e3b63cc293eb179db5fb42c167e4c6675978e90d165b95ba5cac7d0b30d3a3e3e2f251fa32fef66ef68336adf6aba74a661fc83266c6dd2d24a4ba8bfa9c29f873184a82c38b47c03919dcdedaf1fef0f699876a73725163645b6fd3aef32706a5e81ee0aca2202c075a361e757802763586af7581d96e8846276fb72251a15b0137fd3cdd6cfb012eb2a4879a6e5843806a948c41bc2e0b66a3f3f05a4a7d8af48bdbabb"}], 0x170}, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:18 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f00000005c0)={{}, [@netrom, @bcast, @rose, @rose, @null, @remote, @netrom, @rose]}, &(0x7f00000000c0)=0x48) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000740)=0xc) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000780)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r3, &(0x7f0000001800)=ANY=[@ANYRES16=r2, @ANYRES32=r2, @ANYBLOB="60c83a23fbe5489cb369ecdbc65c1296663d70e66509ff6d0e17c8a5bdaf771ad990c473404cd33e04012eae886b04b193527cc5dae753c582a1b3df488557f78f1e99796cb984d862b15fb435f98ed75a107109b52aa3cca5d051ce4c529f901d646e58510d061d3d909ae39273e66b3865226ebfb6e30e96a38d0cd6b83f36e67e4e2fff26373e58a14f0618220d3d3c7bd3d7cd28dcbd29d9fdb0f5ddea31", @ANYRESHEX=r3, @ANYBLOB="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"], 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x14001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000680)={0x7, {{0xa, 0x4e22, 0x9, @local, 0x7}}}, 0x88) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x40, r5, 0x320, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x292ec499}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000080}, 0x40000) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x8000, 0x4) r6 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='-\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r6, 0x290, 0x102e}, &(0x7f0000000180)=ANY=[@ANYBLOB='enc=raw hash=sha256-arm64-neon\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000200)="c497eec0ae2e89414443877ef96f014c4f400da941d8aea11c7047a6975df69de68b382835744eadb0111b0368426eda66f35b0808c48feed0f7d0c4510ac1e013646a335e61142d7bc01345be2045ec73fbe71aeac1024bcefec5325fb2429c63c5e8e64cd888a9e7dc6b14b6d8122d3cc344fd2432765c61abe2642950fa806b29c50281440c8779054aff136d0b33274fb6d29ea272a79f3ff8afd5ac9567355fd7c50dfa8caeca4c04df347fda7c58", &(0x7f00000004c0)="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") execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:19 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="aeba54c68155f5e0b581d7ecff8000000000"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x3ff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x5, 0x80001) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x3, 0x1, 0x6, 0x8001, 0x2}, &(0x7f0000000180)=0x14) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0xf5, 0x201, 0x100000000, 0x800, r1}, 0x10) exit_group(0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x201) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040), &(0x7f00000000c0)=0x4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000004c0)={{0x0, 0x6, 0x8000, 0x3, 'syz0\x00', 0xffffffff}, 0x1, [0x3, 0x81, 0x401, 0xfffffffffffffffe, 0x6, 0x8001, 0xffff, 0x4, 0x8, 0x8000, 0x7c1, 0x401, 0x9, 0x0, 0x5, 0xf1, 0x5, 0x8001, 0x6, 0x100000000, 0x1000, 0x4, 0x8001, 0x200, 0x591, 0x2, 0x401, 0xffffffff, 0x101, 0x2, 0xffffffffffffffff, 0x5, 0x10000, 0xff, 0x4, 0x2, 0x20, 0x200, 0x6, 0x7fffffff, 0x6, 0xfffffffffffff61d, 0x6, 0xfff, 0x101, 0x42, 0x5, 0xfffffffffffffffb, 0x2, 0xa410, 0xfff, 0x7, 0x200, 0x6, 0x8, 0x8, 0x2, 0x0, 0x81, 0x6, 0x1, 0x5, 0x401, 0x1, 0x7ff, 0xffffffffffffff7f, 0x8, 0x10001, 0x8, 0x7, 0xe63d, 0x1, 0x58d, 0x401, 0x2, 0x5e65, 0x52, 0x5, 0xce, 0xffffffffffffffff, 0x1000, 0xffffffffffffff7f, 0x401, 0x0, 0x7, 0xd6, 0x4d9, 0x1000000000000, 0x2d8, 0xa969, 0x5915, 0x7, 0x5, 0x1ff, 0x1, 0x80000000, 0xbb, 0xfff, 0x3ff, 0x800, 0x5, 0x8, 0x927, 0x1, 0x8, 0x100000001, 0x200, 0x9, 0x8000000080000, 0x101, 0x40, 0x7ff, 0x8, 0x400, 0x4, 0x6, 0x2, 0x8, 0xf2c, 0x100, 0x8, 0xa2, 0x80000000, 0x800, 0x3ff, 0xe0c, 0x200, 0x5], {r4, r5+30000000}}) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffe95) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 658.411903] IPVS: ftp: loaded support on port[0] = 21 [ 658.431411] IPVS: ftp: loaded support on port[0] = 21 [ 658.459433] IPVS: ftp: loaded support on port[0] = 21 19:41:19 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x16, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 658.616760] IPVS: ftp: loaded support on port[0] = 21 [ 658.932357] IPVS: ftp: loaded support on port[0] = 21 19:41:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 660.402040] net_ratelimit: 14 callbacks suppressed [ 660.402050] protocol 88fb is buggy, dev hsr_slave_0 [ 660.402459] protocol 88fb is buggy, dev hsr_slave_0 [ 660.407088] protocol 88fb is buggy, dev hsr_slave_1 [ 660.412446] protocol 88fb is buggy, dev hsr_slave_1 [ 660.642066] protocol 88fb is buggy, dev hsr_slave_0 [ 660.647206] protocol 88fb is buggy, dev hsr_slave_1 [ 660.652394] protocol 88fb is buggy, dev hsr_slave_0 [ 660.657446] protocol 88fb is buggy, dev hsr_slave_1 [ 661.042087] protocol 88fb is buggy, dev hsr_slave_0 [ 661.047210] protocol 88fb is buggy, dev hsr_slave_1 19:41:22 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xf, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfb, 0x12000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, &(0x7f00000001c0)=0xfffffffffffffc8e) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000280)={'ah\x00'}, &(0x7f00000002c0)=0x1e) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYBLOB="e600cfc505000400000200000800ffff06007b608c35a483f7d00aa1dd0dbd3e78bf42a28d8bb96d0b7a62166c296c9b00abb5ae1ee9cdd048268704319bb64fa22ab7398a2da1e1daacbb7d1e9f962f7f59b86f0fba14224e1ed6d5f53edb4d9227e5bbee2bc55dac9998ac85649146dd4237d15b292d4afa418543fc52f456893494fbf58ab6b54d9f672e9d5ea2f2edea93df1d170afd73389225e4b2c68297"], &(0x7f0000000240)=0x16) close(r0) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x1043, 0x9) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:22 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xfa03, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:22 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x17, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x247) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="4dd8aed4247f580f3739401940b1d557ae3677aae17cde7ba9fed7b5144c0691589711d398635aeca034bdc9370300df1728"], 0x2) close(r0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 661.448733] IPVS: ftp: loaded support on port[0] = 21 [ 661.466489] IPVS: ftp: loaded support on port[0] = 21 [ 661.483273] IPVS: ftp: loaded support on port[0] = 21 19:41:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x9, 0x3, 0x8, 0x8, 0x8000, 0x1, 0x1, 0x748, 0x1f, 0x7fffffff, 0x9}, 0xb) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) socket$key(0xf, 0x3, 0x2) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x24d) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 662.285705] IPVS: ftp: loaded support on port[0] = 21 [ 662.301735] IPVS: ftp: loaded support on port[0] = 21 [ 662.319487] IPVS: ftp: loaded support on port[0] = 21 19:41:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80000) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x3, 0x5298]}, 0x8) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r2 = accept(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) unlink(&(0x7f0000000140)='./file0\x00') write$P9_RLERRORu(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="ffb9df4e77e7f9fea80edfc68c742c639eb40270da9c65579081c064ce575b9cde37f5468cbde97038728e0fc597b6d8056e2aad117d3fa0021fd994ce599f6f984bdef35796d99e391f9d10d23a9937cceae27c07dc287d589d3497f35d0355b2c93d69cb8ffa978b94d1f81ad653cc8ad1625ee0f8710eda5c57735a9f0d0a09380a0c82cc596d2b579b7a9d7b795e03e3b045a3a1183718f6cccccd"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:26 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x12, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8030000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040)) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff8017f0fec5de4451df4c78562533ceba8b3e26e583e2f3951dfa2281d6b660f3f24b502ef70319"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_emit_ethernet(0xd0, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @remote, [], {@mpls_mc={0x8848, {[{0x0, 0x7, 0x94, 0x100000001}, {0x8, 0x2, 0xfffffffffffffffa, 0x9}, {0x4, 0x1, 0x1, 0x10001}, {0xcf, 0x0, 0x21, 0x10000}], @ipv4={{0x7, 0x4, 0xfff, 0x7, 0xb2, 0x65, 0x431, 0x20000000000000, 0x0, 0x0, @rand_addr=0x2, @local, {[@end, @end, @ra={0x94, 0x6, 0x2}]}}, @igmp={0x17, 0xc4f4, 0x0, @loopback, "137e1c89c589888a81a4520e9ca9bb9f64c8a1236c9910aaf1a47175c238158c11f528f9205e4da1ffbf822cbf31e26db77f2ffa88e8d9fb3a6371de4f4f4d9481bcae4ff3bc5a35959ef3115d18cadf528f5c56ac89238e1dd66216a110341dfe3f2aa0af850c24946ec6f048f8c8471f297e33ac7471040ce3a05236aa96b1fa228a4c7b29451492b96fcd9828"}}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0x388, 0xe8e, 0xe83, 0xfdc]}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 665.676347] IPVS: ftp: loaded support on port[0] = 21 [ 665.762070] net_ratelimit: 23 callbacks suppressed [ 665.762078] protocol 88fb is buggy, dev hsr_slave_0 [ 665.772132] protocol 88fb is buggy, dev hsr_slave_1 19:41:26 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x18, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:26 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x40000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = open(&(0x7f0000000200)='./file0\x00', 0x200400, 0x8) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r3, 0x307, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4acd}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffff1e}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffe}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x10) 19:41:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:26 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x480000, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000140)={0xb, @sliced={0xffffffffffffffff, [0x6, 0x101, 0x5, 0x7, 0xffffffffffffffff, 0x5, 0x9, 0x4, 0x5, 0x42, 0x83, 0x48b02b5a, 0x1, 0x0, 0x9, 0x200, 0x9, 0x54, 0x47ae1e04, 0x6, 0x1, 0x2, 0xffffffffffffff00, 0xae7, 0x101, 0x7, 0x100000001, 0x0, 0x0, 0x1, 0x4, 0x8, 0x6, 0x10000, 0x3ff, 0x1, 0x0, 0x24e, 0x7ff, 0x7ff, 0x8, 0x3, 0xffff, 0x258cb481, 0x20, 0x6, 0xaa7, 0x1], 0x1}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x410000, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x4, {0x9}}, 0x18) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 666.121689] IPVS: ftp: loaded support on port[0] = 21 19:41:27 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/capi/capi20ncci\x00', 0x2, 0x0) bind$pptp(r0, &(0x7f0000000500)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) userfaultfd(0x80000) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="ff0012", 0x3, 0x400}, {&(0x7f0000000140)="904c8a6fd2646926a85c8f3f736999f4806b486073fa0bbe0e7afb2bc43f36b8b2fb3686f0479ac10e6c62f893e05f36fa326136858a8558372db21b52b42653449bcb2fbe4839bec1c417835c77bfa3791487bb68a95c20058315d1a5c4764a85e9471949bfa896d17287a118e4db62c4235fe09056245baa487ee12560004006bbfcd88a209527bdd9c7c009cdc00b9d7b8cb808301880c69c6a12d561c44ab687f48d76bcb74aec957a6bc409d490eb109839bd652bcd95c76e032f39c55699bd69764239d3378caa3eda0c8aa55366770358bd086603620ea4847ee0f84a", 0xe0, 0x5}], 0x10, &(0x7f0000000400)={[{@space_cache_v1='space_cache=v1'}, {@noacl='noacl'}], [{@fowner_gt={'fowner>', r3}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@audit='audit'}]}) [ 666.168653] IPVS: ftp: loaded support on port[0] = 21 19:41:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 666.240056] IPVS: ftp: loaded support on port[0] = 21 19:41:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x4a002, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = accept(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x80) ioctl$SIOCNRDECOBS(r2, 0x89e2) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="ffee303e10bab66548a3578026baac3e4bd8569ba02592f5c77074bd5197fafad9476a3b96c87184405929f319e59065abe4cb267a78d046ef5585aaf8f4e86b585741ed09380b024e4716251bee14042b3f0b8834844af98c6231ad70bd3c299646dc01ad186fbb42"], 0x2) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 666.642068] protocol 88fb is buggy, dev hsr_slave_0 [ 666.642111] protocol 88fb is buggy, dev hsr_slave_1 [ 666.647157] protocol 88fb is buggy, dev hsr_slave_1 [ 666.838401] IPVS: ftp: loaded support on port[0] = 21 [ 666.848439] IPVS: ftp: loaded support on port[0] = 21 [ 666.882215] protocol 88fb is buggy, dev hsr_slave_0 [ 666.887321] protocol 88fb is buggy, dev hsr_slave_1 [ 666.892483] protocol 88fb is buggy, dev hsr_slave_0 [ 666.897532] protocol 88fb is buggy, dev hsr_slave_1 [ 667.292040] protocol 88fb is buggy, dev hsr_slave_0 19:41:29 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x13, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x22100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f0000000100)={r2, r3+10000000}, &(0x7f0000000140)) write$P9_RLERRORu(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="cb424f03360ac81880"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x200) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x1, 0x0) 19:41:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x18000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 668.240034] IPVS: ftp: loaded support on port[0] = 21 [ 668.841669] IPVS: ftp: loaded support on port[0] = 21 19:41:31 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x19, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x24c) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x20000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:31 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) 19:41:31 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x14, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:31 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 670.600010] IPVS: ftp: loaded support on port[0] = 21 [ 670.605972] IPVS: ftp: loaded support on port[0] = 21 19:41:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x30800, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @reserved}, 0x10) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="fffb"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 670.688232] IPVS: ftp: loaded support on port[0] = 21 19:41:31 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0xc1) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000180)) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x402, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000740)=ANY=[@ANYBLOB="34b1f5fb1435022551ec0a5a5fda3f3be9d8aba48e687d6ffa5570bec2f1ffa5818c9172730dc5b51bce699d480b554baf9ed10e9ca2182cfc35ca12978146ac5ab558ee4fb2ad497811338748329007f70b8ed05bf670752e154dd95b44af19094cc9e5887c260ad2e6bcb68e9a9df2f4ac12b06c5cdde537a07f0f0ef770a1642b6f9eaadfd81cc3d7721092f5e9913dd235f67a98881d59be0c638239ca38d9826dd1d191258fc7930757a8587d5677c0e7e84fb0907053a194dcd40a66f7bb5685cff1aa297ceb8cc61bba2b090cac9a8545154bc1f2cf05", @ANYBLOB="e2745e32667b1e235ca66bcf55927010d848872724d2eb2ac58a84e873ce14405e8850e76091f0e0cd5b10211b3d0194b74f0b90e817a12cab6cc9e32cbc69374ddea46b6cdcf935368ebed56360010a103202b29c7a6efc166700a8531736e98212d8e62dff6e1e4dd8ed32f238a13ce6902f6cb4dc5fe7ebf0b15eebaa791fb2373b916fa975d6c5d7e0e9", @ANYRES64=r0], 0x16e) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000200)={0x2, 0x3, 0xd4, 0x0, 0x5, 0x6, 0x4, 0x5, 0x1d, 0x1, 0x6, 0x1f, 0x0, 0xff, 0x3, 0xfffffffffffffffb, 0x80000001, 0x7, 0x2}) close(r2) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r4}, 0x10) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000001c0)=0x0) wait4(r5, 0x0, 0x8, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000240)='reiserfs\x00', &(0x7f0000000280)='./file0\x00', 0x28876663, 0x4, &(0x7f00000005c0)=[{&(0x7f00000002c0)="a4a5f5629c22c4fe483e7d8d79c6d17bef9372caae0dc7418a0eb8e72f65577a402d4acce70c6b5c652bcea4308b8191dfc8efa442bbe6778a1faa73a8ef6fadfa78ceec2fdb0858e328c88fbee4ad1ecd734077c92f3d01f5242efa6a0bb3fb232e8815a0ed8b26c836a1ee2f088a12e8", 0x71, 0xffffffffffffff23}, {&(0x7f0000000340)="f08176051ae4fdd958be81a99d13a59a82b12a3741be989768ca974adf51439c36f816033b82feabc7175a4e0f", 0x2d, 0x3}, {&(0x7f00000004c0)="c25e5a2d712d080e9d13dd92bc8394dd0e7283a1d7c4443e88c1315ef6367a3bde12036a5c41d68debe7419c3c766a9bcd693ad25bba35e341325a59712413b020ed899d3add871eb9bebaf6b55e51fa4d67e43eda86308c1dc4243bcf8892c8b67277f92f9f4e59d13a3eda473860623a368fb1677a092156222550e1aac9e222bd9031851a54e9a2662d639341e435b63de84fc26ed2c65eeb8ccef5e4b0ebb8825692dae08860d08aebb74748f01498fac6aec79df2d570571830347154f5bcea45cd169fd7f2b6b466ab309736c7bddacf5fdced03643083034d90a7264165680a904b4e41030c1aeddc8aa2593af237", 0xf2, 0xc5}, {&(0x7f00000003c0)="9d0fb136d405f602d72a4e0ee9bf5a2606f99b3e0314729845976904aa8a779de6066ae07073e569327efce478ebd8f15c9b7eda10d005df40bd00d04d8e7265a90229c1b3cb66cf69eb5e4be3c494c7445956b6b3d959d60588f95af8b13d9e", 0x60, 0xff}], 0x8008, &(0x7f00000006c0)={[{@grpquota='grpquota'}, {@conv='conv'}, {@hash_rupasov='hash=rupasov'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x39, 0x35, 0x3f, 0x65, 0x35, 0x62, 0x3b], 0x2d, [0x77, 0x63, 0x3f, 0x75], 0x2d, [0x37, 0x38, 0x35, 0x38], 0x2d, [0x30, 0x62, 0x64, 0x35], 0x2d, [0x66, 0x66, 0x66, 0x34, 0x33, 0x32, 0x63, 0x36]}}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fowner_eq={'fowner', 0x3d, r6}}]}) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f00000000c0)={0x2c, @broadcast, 0x4e23, 0x1, 'dh\x00', 0x0, 0x800, 0x27}, 0x2c) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 670.802041] net_ratelimit: 14 callbacks suppressed [ 670.802049] protocol 88fb is buggy, dev hsr_slave_0 [ 670.802055] protocol 88fb is buggy, dev hsr_slave_0 [ 670.802114] protocol 88fb is buggy, dev hsr_slave_1 [ 670.807059] protocol 88fb is buggy, dev hsr_slave_1 19:41:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x28000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0xfffffffd) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 671.042082] protocol 88fb is buggy, dev hsr_slave_0 [ 671.047217] protocol 88fb is buggy, dev hsr_slave_1 [ 671.052414] protocol 88fb is buggy, dev hsr_slave_0 [ 671.057501] protocol 88fb is buggy, dev hsr_slave_1 19:41:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x28010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff80f0cbbca8ad1499976018f7b21c4c5441161725553433cdef67203caeb5a96cbe522ab9e4b7e17404261643095b07e3c8278ea2062015a7415f3aa6"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 671.442037] protocol 88fb is buggy, dev hsr_slave_0 [ 671.447215] protocol 88fb is buggy, dev hsr_slave_1 [ 671.506288] IPVS: ftp: loaded support on port[0] = 21 [ 671.643353] IPVS: ftp: loaded support on port[0] = 21 [ 671.712730] IPVS: ftp: loaded support on port[0] = 21 [ 674.648001] IPVS: ftp: loaded support on port[0] = 21 [ 674.897645] chnl_net:caif_netlink_parms(): no params data found [ 675.008242] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.059700] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.080211] device bridge_slave_0 entered promiscuous mode [ 675.101156] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.131031] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.162938] device bridge_slave_1 entered promiscuous mode [ 675.211295] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 675.243921] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 675.309839] team0: Port device team_slave_0 added [ 675.340772] team0: Port device team_slave_1 added [ 675.434818] device hsr_slave_0 entered promiscuous mode [ 675.483108] device hsr_slave_1 entered promiscuous mode [ 675.541924] IPVS: ftp: loaded support on port[0] = 21 [ 675.549556] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.555978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 675.562668] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.569037] bridge0: port 1(bridge_slave_0) entered forwarding state 19:41:36 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x21, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x28020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 675.739736] IPVS: ftp: loaded support on port[0] = 21 19:41:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x28030000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 675.848847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 675.890059] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.898358] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.940989] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 675.972749] chnl_net:caif_netlink_parms(): no params data found [ 676.021226] 8021q: adding VLAN 0 to HW filter on device team0 19:41:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2c010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 676.085809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 676.102564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 676.109664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 676.162066] net_ratelimit: 23 callbacks suppressed [ 676.162076] protocol 88fb is buggy, dev hsr_slave_0 [ 676.172572] protocol 88fb is buggy, dev hsr_slave_1 [ 676.192626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 676.209944] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.216376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 676.260566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 676.281063] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 676.302465] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.308845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 676.373775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 676.386385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 676.402491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 676.423705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 676.431882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 676.465549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 19:41:37 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x15, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x2c020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:37 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x2000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 676.535869] IPVS: ftp: loaded support on port[0] = 21 [ 676.544574] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 676.553202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 676.576091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 676.593462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 676.608316] IPVS: ftp: loaded support on port[0] = 21 [ 676.610337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 676.618407] IPVS: ftp: loaded support on port[0] = 21 [ 676.660228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 676.738503] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.748667] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.772079] protocol 88fb is buggy, dev hsr_slave_0 [ 676.777263] protocol 88fb is buggy, dev hsr_slave_1 [ 676.784756] device bridge_slave_0 entered promiscuous mode [ 676.803854] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.810226] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.842940] device bridge_slave_1 entered promiscuous mode [ 676.892118] protocol 88fb is buggy, dev hsr_slave_0 [ 676.897231] protocol 88fb is buggy, dev hsr_slave_1 [ 677.012036] protocol 88fb is buggy, dev hsr_slave_0 [ 677.017199] protocol 88fb is buggy, dev hsr_slave_1 [ 677.042032] protocol 88fb is buggy, dev hsr_slave_0 [ 677.042046] protocol 88fb is buggy, dev hsr_slave_0 [ 677.057236] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 677.093055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 677.109527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 677.184517] IPVS: ftp: loaded support on port[0] = 21 [ 677.199299] team0: Port device team_slave_0 added [ 677.213732] team0: Port device team_slave_1 added [ 677.248459] IPVS: ftp: loaded support on port[0] = 21 19:41:38 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x200) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x48000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 677.355602] device hsr_slave_0 entered promiscuous mode [ 677.392333] device hsr_slave_1 entered promiscuous mode 19:41:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x48010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 677.753265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 677.820769] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 677.844676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 19:41:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x48020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 677.869741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 677.908509] 8021q: adding VLAN 0 to HW filter on device team0 [ 677.943661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 677.957167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.969508] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.976216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.052780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 678.083138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 678.101319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.127975] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.134486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.169275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 678.197046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 678.253831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 678.275924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 678.307136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 678.418768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 678.437364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 678.464836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.486456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 678.502187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.521347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 678.541798] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 678.600681] 8021q: adding VLAN 0 to HW filter on device batadv0 19:41:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x42000) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) pipe2$9p(&(0x7f0000000000), 0x84000) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20000, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000140)=ANY=[], 0xfffffdce) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 680.063839] device bridge_slave_1 left promiscuous mode [ 680.069394] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.151508] device bridge_slave_0 left promiscuous mode [ 680.158520] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.253905] device bridge_slave_1 left promiscuous mode [ 680.259437] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.333052] device bridge_slave_0 left promiscuous mode [ 680.338550] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.566861] device hsr_slave_1 left promiscuous mode [ 680.615659] device hsr_slave_0 left promiscuous mode [ 680.667496] team0 (unregistering): Port device team_slave_1 removed [ 680.678655] team0 (unregistering): Port device team_slave_0 removed [ 680.691725] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 680.729737] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 680.829700] bond0 (unregistering): Released all slaves [ 680.974369] device hsr_slave_1 left promiscuous mode [ 681.067404] device hsr_slave_0 left promiscuous mode [ 681.107577] team0 (unregistering): Port device team_slave_1 removed [ 681.118811] team0 (unregistering): Port device team_slave_0 removed [ 681.130937] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 681.179985] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 681.202084] net_ratelimit: 36 callbacks suppressed [ 681.202090] protocol 88fb is buggy, dev hsr_slave_0 [ 681.212043] protocol 88fb is buggy, dev hsr_slave_0 [ 681.212104] protocol 88fb is buggy, dev hsr_slave_1 [ 681.217130] protocol 88fb is buggy, dev hsr_slave_1 [ 681.282050] protocol 88fb is buggy, dev hsr_slave_0 [ 681.287141] protocol 88fb is buggy, dev hsr_slave_1 [ 681.311893] bond0 (unregistering): Released all slaves [ 681.442038] protocol 88fb is buggy, dev hsr_slave_0 [ 681.447144] protocol 88fb is buggy, dev hsr_slave_1 [ 681.452315] protocol 88fb is buggy, dev hsr_slave_0 [ 681.457366] protocol 88fb is buggy, dev hsr_slave_1 19:41:42 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x22, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x48030000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:42 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000100)=""/147) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0xe8, 0x200) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000001c0), 0x4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7fff, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000004c0)={r3, 0x1000, "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"}, &(0x7f0000000140)=0x1008) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 681.738224] IPVS: ftp: loaded support on port[0] = 21 19:41:43 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x16, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:43 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="01b3f405a5f2756f0031b1cb6e5ad27d000100008df035965bdc51a45ab04689c050c89a4653c51c7a5e911ba1c04789c194fbed"], 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x226000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)={0x3e0, r2, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x118, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x80000001, @mcast1, 0x2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xffffffffffff7fff, @ipv4={[], [], @rand_addr=0x3}, 0xbb67}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x8, 0x0}, 0x7ff0000000000}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ae}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1fce000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x176f}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_BEARER={0x118, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8a8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @loopback}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @rand_addr="2a73ac7d48809d119be40a7d920f2457", 0x2}}}}]}]}, 0x3e0}, 0x1, 0x0, 0x0, 0x8000}, 0x1) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000006) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:43 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 682.258702] IPVS: ftp: loaded support on port[0] = 21 [ 682.350707] IPVS: ftp: loaded support on port[0] = 21 19:41:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x4) [ 682.417971] IPVS: ftp: loaded support on port[0] = 21 19:41:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x40, 0x30) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="12f4421974ef83eb68de28bc4d172a45ce86b7759afee4cc3e0144aa5beca2cdca051599ba9a5c"], 0x2) close(r0) inotify_init1(0x80000) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 683.041284] IPVS: ftp: loaded support on port[0] = 21 [ 683.097474] IPVS: ftp: loaded support on port[0] = 21 19:41:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = socket(0x2, 0x4, 0xa356) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x80000) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)=@canfd={{0x3, 0x2, 0x400, 0x6}, 0x6, 0x2, 0x0, 0x0, "b227c50e6b64f758122e967a5380a901b17d24f3dc0e6cfba0f9956d30f6cbeb8af655e71967390642f5704dd8592b332319b03d088a5104e495fd9a570931a4"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="df80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) sched_getattr(r1, &(0x7f0000000040), 0x30, 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4c020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:46 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x29, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:41:46 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x17, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 685.519846] IPVS: ftp: loaded support on port[0] = 21 [ 685.615604] IPVS: ftp: loaded support on port[0] = 21 19:41:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x68000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff80538957ae55501a947c55644ba24c0f4de873357791111d40210a6fa92fca01b00d7f075a26e4ff5a29bd23aedcb69e4de30dcb06a662dd34de42208e67c286666ea3d5ea91926dd8c00c20b3bb04b7"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f00000004c0)={"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"}) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:47 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x4000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x68010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:47 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ef80"], 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x8000, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0xa40, 0x0) linkat(r1, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00', 0x32e0c535151cf21d) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendto$unix(r0, &(0x7f0000000100)="2706032f4f5406ac4df3dc5d914b811727c04a76f67531bf29749f02ecfe074ea2d4c6d04fc8cc654e20b294f639cab0a161c48c64ce075deb5b6bcb832a9bfdd4cb9e4ae42e28b57d8a20f17c87c19bfc30774fbcf3c54e1b3b24457e947385cdcb241cacb4eb5e1dc2107ab7efad14abc18e3907ff9f9fe006b5c2c8c5d2786f840b6e94075c32c2d69467ad259bca94", 0x91, 0x20000000, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 686.176265] IPVS: ftp: loaded support on port[0] = 21 [ 686.334044] IPVS: ftp: loaded support on port[0] = 21 19:41:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x68020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x20) write$9p(r1, &(0x7f0000000100)="e11fa53f41c157d791d7c723d788934c4ba553edb4080b48696a1c5e20fe21469af52fa72221215477688c6625697e86652c09144c498c9673f8bf0ed17d83f996e4148400cc0313e46bd6ce22744b1443157c948d02ff647e3e7a278a153e9a81adadf1dd135678dc6ea9dae7e4e22c6cd360b8cf7fe4fa322de08532d82dde1e6db42a7a1d04dd6409174209008525c87fc68df2516eb68484b27510b74f7cbe25571bd3d91e", 0xa7) write$P9_RLERRORu(r1, &(0x7f0000000200)=ANY=[], 0x0) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2400, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000100)=""/125) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 686.521480] IPVS: ftp: loaded support on port[0] = 21 19:41:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x68030000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 686.922284] IPVS: ftp: loaded support on port[0] = 21 [ 687.282064] net_ratelimit: 24 callbacks suppressed [ 687.282073] protocol 88fb is buggy, dev hsr_slave_0 [ 687.292192] protocol 88fb is buggy, dev hsr_slave_1 [ 687.442039] protocol 88fb is buggy, dev hsr_slave_0 [ 687.442076] protocol 88fb is buggy, dev hsr_slave_1 [ 687.447176] protocol 88fb is buggy, dev hsr_slave_1 [ 687.522162] protocol 88fb is buggy, dev hsr_slave_0 [ 687.527300] protocol 88fb is buggy, dev hsr_slave_1 [ 687.682045] protocol 88fb is buggy, dev hsr_slave_0 [ 687.687173] protocol 88fb is buggy, dev hsr_slave_1 [ 687.692341] protocol 88fb is buggy, dev hsr_slave_0 19:41:50 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x30, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 690.078394] IPVS: ftp: loaded support on port[0] = 21 19:41:51 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x18, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x202202, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xffffffffffff4cf9}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 19:41:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x6, 0x4, 0x5}, 0xfffffffffffffff8}}, 0x18) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:51 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xa020000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0580"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10000, 0x0) [ 690.453545] IPVS: ftp: loaded support on port[0] = 21 [ 690.494080] IPVS: ftp: loaded support on port[0] = 21 19:41:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80040, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000040)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 690.691192] IPVS: ftp: loaded support on port[0] = 21 19:41:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0182a9930c62ed537172fcde86114a457a21e17954eab1f29f2c7e98b41e972de269c513371478d52fa8"], 0x2) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x6c020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:51 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="de80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x10, 0x3) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 691.266215] IPVS: ftp: loaded support on port[0] = 21 [ 691.289211] IPVS: ftp: loaded support on port[0] = 21 19:41:53 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x31, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 692.702815] IPVS: ftp: loaded support on port[0] = 21 [ 693.140193] IPVS: ftp: loaded support on port[0] = 21 [ 693.522122] net_ratelimit: 24 callbacks suppressed [ 693.522131] protocol 88fb is buggy, dev hsr_slave_0 [ 693.532199] protocol 88fb is buggy, dev hsr_slave_1 [ 693.682045] protocol 88fb is buggy, dev hsr_slave_0 [ 693.682051] protocol 88fb is buggy, dev hsr_slave_0 [ 693.682102] protocol 88fb is buggy, dev hsr_slave_1 [ 693.687136] protocol 88fb is buggy, dev hsr_slave_1 [ 693.762441] protocol 88fb is buggy, dev hsr_slave_0 [ 693.767535] protocol 88fb is buggy, dev hsr_slave_1 [ 693.922046] protocol 88fb is buggy, dev hsr_slave_0 [ 693.927146] protocol 88fb is buggy, dev hsr_slave_1 19:41:54 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x19, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1000080) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x0, 0x101, 0x8, 0x1}, 0x10) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000100)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x88000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fstat(r0, &(0x7f0000000100)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x9, 0x100, 0x1, 0x0, 0x0, [{r1, 0x0, 0x4e3}]}) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:54 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xc010000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:54 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x32, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 694.096176] IPVS: ftp: loaded support on port[0] = 21 [ 694.104125] IPVS: ftp: loaded support on port[0] = 21 19:41:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff9c"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1a) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 694.146550] IPVS: ftp: loaded support on port[0] = 21 19:41:55 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000100)=0xf7) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000004c0)={"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"}) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="ff67e2bb5a6a8357f41993337cdc765937787fe7b19e3f4d76504bec29a482a950b9b915b2ea8801ccbf217cbf4f3b0d8b39ec2b8fdd0a761c0973f130619b3dc4c39991d5e656d47e72f2fd7b93efe26714418a34a314008d88145f8126e0f75db30782a8816c3238f5c0c5198565d918476c45b430a2ea79b92858f8094f9287c0e32d44e4528f9f2ddfc374cab54ccc0e1d5d13bd3efbf0cc4b5d32461f32f2036f42d0"], 0x1) close(r2) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)='netdevsim0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x7, 0x20}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000003c0)={r3, @in={{0x2, 0x4e21, @empty}}}, 0x84) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0xaf526fa2dd0bf0bb, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x7, 0x4) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)='/dev/vhci\x00') openat$rtc(0xffffffffffffff9c, 0x0, 0x4, 0x0) 19:41:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x88010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x181080, 0x106) write$9p(r0, &(0x7f0000000100)="c87144ea98205fb976fcf63e3f4f00cf9f72161fcb27f0bd28877150768b5f90ab7f0aa2f80ecbe5208f744d3585213c6e8baf85340f75a256ca7a68027b5ea77c9b4549b47be841e6106df79531d5fb7fdf8ec73f6dbc87cef799d633ec5eb3c86b8318cb492ba37940c69a6940e9edfb4604adcf8179219ee41bcbb220317f845fd3fab829f0cd5546ddc3fdd36a437fd21e15abd35d527d61e77d93abfe80fee5b3264ac0e08f90", 0xa9) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) rt_sigpending(&(0x7f0000000040), 0x8) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6100000080000000002d136053172135e03681c387"], 0x2) write$P9_RXATTRWALK(r0, &(0x7f00000001c0)={0xf, 0x1f, 0x2, 0x1000}, 0xf) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) fcntl$getflags(r0, 0x401) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x88020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 695.005516] IPVS: ftp: loaded support on port[0] = 21 [ 695.059249] IPVS: ftp: loaded support on port[0] = 21 [ 695.066488] IPVS: ftp: loaded support on port[0] = 21 19:41:56 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x21, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000000)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x208, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004040}, 0x4000) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x88030000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 695.357258] IPVS: ftp: loaded support on port[0] = 21 [ 695.959688] IPVS: ftp: loaded support on port[0] = 21 19:41:58 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x11000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:41:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) write(r0, &(0x7f0000000000)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffff", 0x24) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x0, 0x0, 0x6}, 0x1}}, 0x18) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8c000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:58 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x22, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:41:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8301, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:58 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x41, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) [ 697.540323] IPVS: ftp: loaded support on port[0] = 21 19:41:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x8c010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 697.611809] IPVS: ftp: loaded support on port[0] = 21 [ 697.613853] IPVS: ftp: loaded support on port[0] = 21 19:41:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="4e382ced158d127ef685d36b9fccf454eae983f77c62a99134977bbd853ecb1620cd3f1f8c558cd80fbd8492d5439383ca2b25ec203210504219cde668e2bb021a7860646083f0b9e0499cc81632a9ad38bd94a29e290b5201934404e5441786d14edd62e673ec6b6fcbdfae6528788b3fe77520966acd1cc9cd771dfd8ca7e95099d349cd16ace53d8c38f7ea8cde066d9c2db34b9adaa2a27807f7ae6d57edbf90b533dcb40f542c4789bcf6f4ce0484ac7aeab801a8c01c03b14950ac19db9d2e6bae5c6cf3fd6b722ec97d45f330f450d32d3b91423dee3e09b998d91b331898e124d412e86676b9701e31", 0xed}, {&(0x7f00000001c0)="7564f02b1ffce8b0213949c96ee0a7aabae3cc19eafde8e9a69deb128b12299fc0fdc7006c899269c909d4f4d213f9732c02220c5e81bbcbce6ae4a7f63ad6767dc02a24fa0330ef0d853b30161518d03efb682993e0beef1196efeaea4e52dd714baeaeca55b372862dab1f978f1a153229cf7e74d91548bd39523f3c19c153898fc13fecc1f7fc0ff15ccd20eb01a1bcabb9897ec210b1f3d592b862e83c7228caf871673e20cf98dee292d7026ff8871ac146ac4d1e88a40cb5894907a84519a32ae2e42b885d7871728c06baf62d9f623e41b1ed68b1b3d93f", 0xdb}, {&(0x7f00000004c0)="a3eff955a2e80d51274c32059dd6dad2e26dacff0bddd2a43d29e53d3daf3ce33fb89cbbcb0227c651db7dbfb286662455e1db3d3b7980f567fac23e0a5c2e2ce6a833fe7a26d5d3f085e8c752f9b2a97946cd75d9c3a74bb56840f8165643190c57cb31f97a0278b18f0a107e96dd46327822698650899c07fda4b1b13d604ecaffc449aa645191bc1ea9f2ad74de3f3ca1169e39c33bddd4a9f759984aeb8ce405feb6204be11e6b49e038f6d87e0730e121c8ae4e94789a06ba93833111b36fcbcce298d9bb8f1252cbc0bbfa9b1dea57ea892e59f557f7011935a6f9c580b0a7b51bbc606fb89f1f1c", 0xeb}, {&(0x7f00000002c0)="cd608d7994f6051155d096f8295720d7b47e4535141483d5ab7e0a317e2bf73c4688d4f389cc9f6fffba3664d96afd8863b8d9500ad9b25778ad47dfa1ed35eb1c94d1fe4951efa7b6371b7e23077ca87b3529d98e5628f37a28b684fe74875a08480884d79eacd792c8d05cf71790d03ea6da6d97a0a31454e989a4a64ab1af305f4c24f0ad55cd8cebde27487b2eafb25821a7dc1395a54c714c", 0x9b}, {&(0x7f00000005c0)="7a1f1d07f885e2916294613a7b63bb9404388708defc9ede9ea54dce479db3cc4e6b5ee500100721c27ecd9cea39b4c5e0ed12547eada24ceda951c468a78bf6c39a472a84adc7350b2bb9797f24e9baaba548edfb5ca29837f9aea8c97e2ec4543e89e096e3d18599313984015c586f294db48fb417085535f2d24ccda6e9852541c2b52002e1ce9d0298bb30fd0710e3592583fafdbd823e06ae1f8acf43bcfdd48ad2b0606acc1f5fa49636ecec56767ff2c4daeaa27334d3d33e9494ef959382627162c83ccd97d9e0e3d96a5d3d2e6845ac3801d97986ba29ba15026295ee6ba22014866da27e76b99112", 0xed}], 0x5, 0x2) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa8000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:41:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="8eb4606201cc7029623d3608029d1517c44a49490fc0fb44fb42b9cd9c23d5751d069505760c", 0x26, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r1, 0x60000000000) 19:41:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ff808aa46a36bdec106c4700a8a777ddbfa24257eb155895547a75f11a9fc1ce79e986745f1fee6d5f1d51237b701e6020f9f6240d71b45c17cf1683646e613bcf6365b3b05dea6363a37ccbfde1c8520d0b073e51376a82ef9c53f2558887cb30354a0137aeb77bbbdecb5cbd6ee64d168df62f7aa6dcd2487953f1d18e2d7997ecaa"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:41:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa8010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 698.534569] IPVS: ftp: loaded support on port[0] = 21 [ 698.611446] IPVS: ftp: loaded support on port[0] = 21 [ 698.633802] IPVS: ftp: loaded support on port[0] = 21 [ 699.762065] net_ratelimit: 26 callbacks suppressed [ 699.762075] protocol 88fb is buggy, dev hsr_slave_0 [ 699.772194] protocol 88fb is buggy, dev hsr_slave_1 [ 699.922050] protocol 88fb is buggy, dev hsr_slave_0 [ 699.922082] protocol 88fb is buggy, dev hsr_slave_1 [ 699.927203] protocol 88fb is buggy, dev hsr_slave_1 [ 700.002096] protocol 88fb is buggy, dev hsr_slave_0 [ 700.007216] protocol 88fb is buggy, dev hsr_slave_1 [ 700.162064] protocol 88fb is buggy, dev hsr_slave_0 [ 700.167201] protocol 88fb is buggy, dev hsr_slave_1 [ 700.172952] protocol 88fb is buggy, dev hsr_slave_0 19:42:03 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x1d000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100000000007ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="b24ee7acbb01ec"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x84800) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa8020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:03 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x29, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:42:03 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x42, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:42:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x401, 0x80000) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff8061f58ed214de7efe06fe6079df4822f1a461d310cff7b66968536c726d7c7ebee589dc27244f0558283fa2eb1e4beb1559661319a00fc2ff4ca6d3949746c4179a56d77210204311512ffc20aa88457bc13bfe88e81c6879ad9ff9eb175d430c8097a6fe2f62"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000000)={0x4, 0x0, 0x10001, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000040)={r2, 0x3}) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) [ 702.349092] IPVS: ftp: loaded support on port[0] = 21 [ 702.372399] IPVS: ftp: loaded support on port[0] = 21 [ 702.399456] IPVS: ftp: loaded support on port[0] = 21 19:42:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa8030000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/219, 0xdb) exit_group(0x5e) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="fd80360cc309bb6ee82814620777338e6b720eb7165050d2c140c2699c53a0e93a447da956db0d1b6892926e4e579b04624ad1b2b7e170f4a692de71ac77a5b6cfb1b7b7d76298bfee5221681d432f28b502336f9fc974aa3cbe43a64f4fdf6d1bb222ef0f"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@rc={0x1f, {0x1, 0x5, 0x3, 0x7, 0x3, 0x6}, 0x46}, 0x80, 0xffffffffffffffff, 0x0, &(0x7f0000000100)=[{0x20, 0x105, 0x9, "744d0628876b3b0f470debf4"}], 0x20}, 0x24000000) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80200, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x100, 0xffffffff, 0x8, 0x8, 0x4}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x4}, 0xc) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 703.098059] IPVS: ftp: loaded support on port[0] = 21 [ 703.100636] IPVS: ftp: loaded support on port[0] = 21 [ 703.156170] IPVS: ftp: loaded support on port[0] = 21 [ 705.221585] IPVS: ftp: loaded support on port[0] = 21 [ 705.474670] chnl_net:caif_netlink_parms(): no params data found [ 705.595441] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.611718] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.630385] device bridge_slave_0 entered promiscuous mode [ 705.652963] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.659400] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.690813] device bridge_slave_1 entered promiscuous mode [ 705.740415] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 705.778260] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 705.847342] team0: Port device team_slave_0 added [ 705.886779] team0: Port device team_slave_1 added [ 706.002050] net_ratelimit: 24 callbacks suppressed [ 706.002060] protocol 88fb is buggy, dev hsr_slave_0 [ 706.012150] protocol 88fb is buggy, dev hsr_slave_1 [ 706.033134] device hsr_slave_0 entered promiscuous mode [ 706.092394] device hsr_slave_1 entered promiscuous mode [ 706.140819] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.147241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.153926] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.160312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.162050] protocol 88fb is buggy, dev hsr_slave_0 [ 706.166997] protocol 88fb is buggy, dev hsr_slave_0 [ 706.172566] protocol 88fb is buggy, dev hsr_slave_1 [ 706.177555] protocol 88fb is buggy, dev hsr_slave_1 [ 706.242083] protocol 88fb is buggy, dev hsr_slave_0 [ 706.247192] protocol 88fb is buggy, dev hsr_slave_1 [ 706.345541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 706.377167] 8021q: adding VLAN 0 to HW filter on device team0 [ 706.402045] protocol 88fb is buggy, dev hsr_slave_0 [ 706.407140] protocol 88fb is buggy, dev hsr_slave_1 [ 706.412796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 706.442716] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.462243] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.493318] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 706.522106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 706.530013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 706.552849] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.559250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.575590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 706.583629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 706.591293] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.597995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.605373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 706.664205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 706.672734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 706.680608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 706.712752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 706.720649] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 706.752777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 706.760524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 706.781489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 706.789698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 706.797845] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 706.810572] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 706.855327] 8021q: adding VLAN 0 to HW filter on device batadv0 19:42:08 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x30010000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xac000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:08 executing program 2: socketpair$unix(0x1, 0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2, 0x0) utimensat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {0x0, 0x2710}}, 0x100) close(r0) mq_open(&(0x7f0000000000)='+(trusted+ppp1\x00', 0x2, 0x1, &(0x7f0000000100)={0x3, 0xffffffffffffffff, 0x3ff, 0x1, 0x1, 0x101, 0x400, 0x5}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) memfd_create(&(0x7f0000000200)='\x00', 0x6) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:08 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x30, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 707.300046] IPVS: ftp: loaded support on port[0] = 21 [ 707.356397] IPVS: ftp: loaded support on port[0] = 21 19:42:08 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x43, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:42:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000040)={0x5b}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff1050d5db1443355580"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xac010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="fe803a5ee3392eaa2e3daa4af22096f40e9ab51735dd216f84d6"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 19:42:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x11, 0x0, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000180)={0x3, 0x0, 0x1, 0x20}) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) 19:42:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x3}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20004800}, 0x10) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 707.861199] IPVS: ftp: loaded support on port[0] = 21 [ 708.121540] IPVS: ftp: loaded support on port[0] = 21 [ 708.188156] IPVS: ftp: loaded support on port[0] = 21 [ 708.525611] IPVS: ftp: loaded support on port[0] = 21 [ 710.313855] device bridge_slave_1 left promiscuous mode [ 710.319400] bridge0: port 2(bridge_slave_1) entered disabled state [ 710.373032] device bridge_slave_0 left promiscuous mode [ 710.378554] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.554180] device hsr_slave_1 left promiscuous mode [ 710.627776] device hsr_slave_0 left promiscuous mode [ 710.669783] team0 (unregistering): Port device team_slave_1 removed [ 710.681532] team0 (unregistering): Port device team_slave_0 removed [ 710.693831] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 710.727965] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 710.821162] bond0 (unregistering): Released all slaves 19:42:12 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x3c030000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc8000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:12 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x44, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:42:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x18100, 0x8) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000040)={0x100000000}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 711.362042] net_ratelimit: 36 callbacks suppressed [ 711.362050] protocol 88fb is buggy, dev hsr_slave_0 [ 711.372219] protocol 88fb is buggy, dev hsr_slave_1 19:42:12 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x31, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:42:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1b8a, 0x0, 0x0, 0x0, 0x20000000004, 0xd28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x80000000, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r2, 0x0) 19:42:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x224000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x80000, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000040)='./file0\x00', 0x110000, 0x800) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x4}) write$P9_RWRITE(r2, &(0x7f0000000100)={0xb, 0x77, 0x2, 0x2}, 0xb) 19:42:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x424000) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000040)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000100)={0xffff, 0x2}, 0xc) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 711.483032] IPVS: ftp: loaded support on port[0] = 21 [ 711.492828] IPVS: ftp: loaded support on port[0] = 21 19:42:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc8010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 711.647276] IPVS: ftp: loaded support on port[0] = 21 19:42:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0xfffffffc) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair(0x0, 0x80007, 0x101, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$netrom(r1, 0x0, &(0x7f0000000040), 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:12 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pread64(r0, 0x0, 0x0, 0x0) 19:42:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc8020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 712.242066] protocol 88fb is buggy, dev hsr_slave_0 [ 712.247263] protocol 88fb is buggy, dev hsr_slave_1 [ 712.402063] protocol 88fb is buggy, dev hsr_slave_0 [ 712.402298] protocol 88fb is buggy, dev hsr_slave_0 [ 712.407217] protocol 88fb is buggy, dev hsr_slave_1 [ 712.412303] protocol 88fb is buggy, dev hsr_slave_1 [ 712.441849] IPVS: ftp: loaded support on port[0] = 21 [ 712.551785] IPVS: ftp: loaded support on port[0] = 21 [ 712.618923] IPVS: ftp: loaded support on port[0] = 21 [ 712.642096] protocol 88fb is buggy, dev hsr_slave_0 [ 712.647213] protocol 88fb is buggy, dev hsr_slave_1 [ 715.594099] IPVS: ftp: loaded support on port[0] = 21 [ 715.726234] chnl_net:caif_netlink_parms(): no params data found [ 715.795578] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.802228] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.809444] device bridge_slave_0 entered promiscuous mode [ 715.852563] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.858948] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.866607] device bridge_slave_1 entered promiscuous mode [ 715.895371] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 715.904948] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 715.919649] team0: Port device team_slave_0 added [ 715.926008] team0: Port device team_slave_1 added 19:42:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xcc000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:16 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:42:16 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x32, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:42:16 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 19:42:16 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x40000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 715.974592] device hsr_slave_0 entered promiscuous mode [ 716.010418] IPVS: ftp: loaded support on port[0] = 21 19:42:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0xfffffffffffffffe, 0x0) sendmsg$nl_generic(r1, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)}, 0x0) [ 716.045365] IPVS: ftp: loaded support on port[0] = 21 [ 716.062622] device hsr_slave_1 entered promiscuous mode [ 716.099066] IPVS: ftp: loaded support on port[0] = 21 19:42:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xcc010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 716.214292] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.220698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 716.227411] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.233834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.402109] net_ratelimit: 16 callbacks suppressed [ 716.402118] protocol 88fb is buggy, dev hsr_slave_0 [ 716.412229] protocol 88fb is buggy, dev hsr_slave_1 19:42:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe8000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 716.562104] protocol 88fb is buggy, dev hsr_slave_0 [ 716.562174] protocol 88fb is buggy, dev hsr_slave_0 [ 716.567293] protocol 88fb is buggy, dev hsr_slave_1 [ 716.572274] protocol 88fb is buggy, dev hsr_slave_1 [ 716.602740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 716.655985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 716.666296] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.686991] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.704958] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 19:42:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe8010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 716.734857] 8021q: adding VLAN 0 to HW filter on device team0 [ 716.750741] device bridge_slave_1 left promiscuous mode [ 716.756645] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.802103] protocol 88fb is buggy, dev hsr_slave_0 [ 716.807275] protocol 88fb is buggy, dev hsr_slave_1 [ 716.812481] protocol 88fb is buggy, dev hsr_slave_0 [ 716.817548] protocol 88fb is buggy, dev hsr_slave_1 [ 716.821185] IPVS: ftp: loaded support on port[0] = 21 [ 716.833455] device bridge_slave_0 left promiscuous mode [ 716.840306] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.888049] IPVS: ftp: loaded support on port[0] = 21 [ 716.895330] IPVS: ftp: loaded support on port[0] = 21 [ 717.057054] device hsr_slave_1 left promiscuous mode 19:42:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000006f9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50000070000001f00000000000003000000000000020001000000000000000002f400000005000500000000000a00000000000000ff1700000000000000100000000000170000000000000000"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000002, 0x0) [ 717.117510] device hsr_slave_0 left promiscuous mode [ 717.181839] team0 (unregistering): Port device team_slave_1 removed [ 717.198853] team0 (unregistering): Port device team_slave_0 removed [ 717.209600] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 717.259228] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 717.349278] bond0 (unregistering): Released all slaves [ 717.593396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 717.609682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 717.635606] bridge0: port 1(bridge_slave_0) entered blocking state [ 717.642101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 717.671137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 717.691441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 717.725247] bridge0: port 2(bridge_slave_1) entered blocking state [ 717.731729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 717.766149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 717.787145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 717.799120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 717.815781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 717.828527] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 717.850503] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 717.902001] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 717.940058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 717.969192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 717.978031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 718.014125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 718.021916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 718.052634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 718.069879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 718.103051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 19:42:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x498, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefffffffffffff41}) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") read(r1, &(0x7f0000000140)=""/109, 0x6d) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000080)) 19:42:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe8020000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:19 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0x5646, 0x0) [ 718.421630] Sensor A: ================= START STATUS ================= [ 718.453356] Sensor A: Test Pattern: 75% Colorbar [ 718.467407] Sensor A: Vertical Flip: false [ 718.491626] Sensor A: Horizontal Flip: false 19:42:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xec000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 718.513026] Sensor A: Brightness: 128 [ 718.531441] Sensor A: Contrast: 128 [ 718.554064] Sensor A: Hue: 0 [ 718.568119] Sensor A: Saturation: 128 [ 718.603820] Sensor A: ================== END STATUS ================== 19:42:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xec010000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:21 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x11\x00'}, &(0x7f0000000300)=0x54) 19:42:21 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x4a020000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:21 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="8eb4606201cc7029623d3608029d1517c44a49490fc0fb44fb42b9cd9c23d5751d069505760c", 0x26, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r1, 0x60000000000) 19:42:21 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x41, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:42:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fstat(r0, &(0x7f0000000100)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000000)={0x9, 0x100, 0x1, 0x0, 0x0, [{r1, 0x0, 0x4e3}]}) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 721.115724] IPVS: ftp: loaded support on port[0] = 21 [ 721.123274] IPVS: ftp: loaded support on port[0] = 21 19:42:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 721.212716] IPVS: ftp: loaded support on port[0] = 21 19:42:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0xa020000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:22 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x17, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 721.517697] IPVS: ftp: loaded support on port[0] = 21 [ 721.535237] IPVS: ftp: loaded support on port[0] = 21 19:42:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 721.762060] net_ratelimit: 29 callbacks suppressed [ 721.762069] protocol 88fb is buggy, dev hsr_slave_0 [ 721.772188] protocol 88fb is buggy, dev hsr_slave_1 19:42:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 721.972737] IPVS: ftp: loaded support on port[0] = 21 19:42:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 722.101324] IPVS: ftp: loaded support on port[0] = 21 [ 722.231633] IPVS: ftp: loaded support on port[0] = 21 19:42:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 722.562104] protocol 88fb is buggy, dev hsr_slave_0 [ 722.567285] protocol 88fb is buggy, dev hsr_slave_1 19:42:23 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x88\x00'}, &(0x7f0000000300)=0x54) [ 722.720856] IPVS: ftp: loaded support on port[0] = 21 [ 722.802038] protocol 88fb is buggy, dev hsr_slave_0 [ 722.802082] protocol 88fb is buggy, dev hsr_slave_1 [ 722.807150] protocol 88fb is buggy, dev hsr_slave_1 [ 723.042048] protocol 88fb is buggy, dev hsr_slave_0 [ 723.047167] protocol 88fb is buggy, dev hsr_slave_1 [ 723.052341] protocol 88fb is buggy, dev hsr_slave_0 [ 723.201436] IPVS: ftp: loaded support on port[0] = 21 19:42:26 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x5a030000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = socket(0x2, 0x4, 0xa356) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x80000) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)=@canfd={{0x3, 0x2, 0x400, 0x6}, 0x6, 0x2, 0x0, 0x0, "b227c50e6b64f758122e967a5380a901b17d24f3dc0e6cfba0f9956d30f6cbeb8af655e71967390642f5704dd8592b332319b03d088a5104e495fd9a570931a4"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:26 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x42, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:42:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f00000004c0)={"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"}) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = socket(0x2, 0x4, 0xa356) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x80000) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)=@canfd={{0x3, 0x2, 0x400, 0x6}, 0x6, 0x2, 0x0, 0x0, "b227c50e6b64f758122e967a5380a901b17d24f3dc0e6cfba0f9956d30f6cbeb8af655e71967390642f5704dd8592b332319b03d088a5104e495fd9a570931a4"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f00000004c0)={"eddffdcf7d41a054fea32cfd2e8a853d032c2fb7d0dc1118ea9e3e4d82c731b2bd33538ea021a29496a38ef0697570dbc90dd653114037d84efa106480b60a6ef69638db036a5371290462eb9d17c43d99a27e8aa54a8dd1385574e9bb0cd8c26c0052a9aaeba64b1e97a884c536e1afad50e1d202df8c6cddc4f30d457eed79f95a38f1a9626ae010a8ac8443d467bf715f45bcb53182d412e15ae665c949af5b6d2132d07577379dd6ddd8b564d862f105ec8b4a6c6ab1ef1909f6d9524ebb3be6fb96ec9ad57837ecfe44390bba436b6022bac3599a143e20f03043c959b52f54751e85ecff5ef19ea17d36d1e22b75c5fa6a7c569fbaa51d92c9b30bd4c6cbec182a3d401171debfacd7acda33d2c272369e727caeeb40dd17e16b6292d421c3d457ddc06b7ab0ffdcced5534620d865872004430b29acdffe1b432d346a22cd55fdf98d07f26d17a49bd628259a358365bb2970661feb6cf3527ccad99f762edc58225c6a5bec0f11f2c2a2fe09ecdfadcff12b89b7e603a22517d45a397afba6a3d906f9d9278792498709d5a32af876fa5fc018adaac0c1fdb3e99c7a44c9722513b2b4ac4245276e4db386927e611214a73f75a8e8691420099cffb4e664836ecbf18d53964bca2107c0e75c3e9a15333c358fa08c83f83932c32c09ca1b1c3a728fac236ced76414bd746af197af7c12dd3d473936930b29a77f3ec9b1ef5c56c2c631ec2006d14f6d9f0d420f5aa3bd81af6afbec2cd78dd533d1007a1b4572dda3f3451ae80edcbfcf4ffade1cff40b98c522286f13d62c69e393fc1b1b945dbe7dbad8d3e68923e4638458b193275b936fed923aadfc67e72912793352e3fdc9c564c3186a22dc0208dccca5e6ac35337455f92a5d93b9f354bb3c406d4df093bf205b75f30b9a87b02447504fb7e311de48d338ec13009277cb3963d37964b23242b20cac5e147726351cc354176fa084ec02b72ee27b2575f293d10abcff4e8b944090eed957eb4bad04c837864d575d6b178a590fa0f43ae0b6778bbf96a7159f4939083b0e9a839d690fd7d26cf563be05c6d3db0b9487a21c3aacc737a50a72497041e51772d9e5f287aa4031d6de5338cbf7466645952bbb1c8c97d5ae932e9cbd0606839896a970295c78b0c7ef7e5542dfc4b725b12353220054e00af6b7c1c9ed4aa80f945959f78698eafc7923d86a9d9994f8aa2e7170dbd0676d044ead3f115ad69abaec85b0d2c55fabb40641dbf9d5846fd6299fa0fcc46da0ae2554d6f932e600132d21c3607290fcbd6bff5a913739cff2d3f19c4e4845ea034c5f77d3c23b252cad4f9f1efceacad21dafa65e2828ed179c64f81c7774d9fc70fc13a9f184792f62d240a0fce889067297e2b505adb124c5a9ab6c118c463185f2a9d3e018759765d82d71ea80af55c0600a37bb25aa14c8"}) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 725.357121] IPVS: ftp: loaded support on port[0] = 21 [ 725.370767] IPVS: ftp: loaded support on port[0] = 21 19:42:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000006) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff80f0cbbca8ad1499976018f7b21c4c5441161725553433cdef67203caeb5a96cbe522ab9e4b7e17404261643095b07e3c8278ea2062015a7415f3aa6"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x800000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 726.147893] IPVS: ftp: loaded support on port[0] = 21 [ 726.222859] IPVS: ftp: loaded support on port[0] = 21 19:42:27 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00\x11\x00'}, &(0x7f0000000300)=0x54) [ 726.883446] IPVS: ftp: loaded support on port[0] = 21 [ 726.962037] net_ratelimit: 15 callbacks suppressed [ 726.962046] protocol 88fb is buggy, dev hsr_slave_0 [ 726.962050] protocol 88fb is buggy, dev hsr_slave_0 [ 726.962108] protocol 88fb is buggy, dev hsr_slave_1 [ 726.967046] protocol 88fb is buggy, dev hsr_slave_1 [ 727.202071] protocol 88fb is buggy, dev hsr_slave_0 [ 727.207232] protocol 88fb is buggy, dev hsr_slave_1 [ 727.212397] protocol 88fb is buggy, dev hsr_slave_0 [ 727.217469] protocol 88fb is buggy, dev hsr_slave_1 [ 727.335330] IPVS: ftp: loaded support on port[0] = 21 [ 728.002058] protocol 88fb is buggy, dev hsr_slave_0 [ 728.007215] protocol 88fb is buggy, dev hsr_slave_1 19:42:30 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x62020000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff80f0cbbca8ad1499976018f7b21c4c5441161725553433cdef67203caeb5a96cbe522ab9e4b7e17404261643095b07e3c8278ea2062015a7415f3aa6"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x5, 0x80001) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x3, 0x1, 0x6, 0x8001, 0x2}, &(0x7f0000000180)=0x14) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0xf5, 0x201, 0x100000000, 0x800, r1}, 0x10) exit_group(0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x201) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040), &(0x7f00000000c0)=0x4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000004c0)={{0x0, 0x6, 0x8000, 0x3, 'syz0\x00', 0xffffffff}, 0x1, [0x3, 0x81, 0x401, 0xfffffffffffffffe, 0x6, 0x8001, 0xffff, 0x4, 0x8, 0x8000, 0x7c1, 0x401, 0x9, 0x0, 0x5, 0xf1, 0x5, 0x8001, 0x6, 0x100000000, 0x1000, 0x4, 0x8001, 0x200, 0x591, 0x2, 0x401, 0xffffffff, 0x101, 0x2, 0xffffffffffffffff, 0x5, 0x10000, 0xff, 0x4, 0x2, 0x20, 0x200, 0x6, 0x7fffffff, 0x6, 0xfffffffffffff61d, 0x6, 0xfff, 0x101, 0x42, 0x5, 0xfffffffffffffffb, 0x2, 0xa410, 0xfff, 0x7, 0x200, 0x6, 0x8, 0x8, 0x2, 0x0, 0x81, 0x6, 0x1, 0x5, 0x401, 0x1, 0x7ff, 0xffffffffffffff7f, 0x8, 0x10001, 0x8, 0x7, 0xe63d, 0x1, 0x58d, 0x401, 0x2, 0x5e65, 0x52, 0x5, 0xce, 0xffffffffffffffff, 0x1000, 0xffffffffffffff7f, 0x401, 0x0, 0x7, 0xd6, 0x4d9, 0x1000000000000, 0x2d8, 0xa969, 0x5915, 0x7, 0x5, 0x1ff, 0x1, 0x80000000, 0xbb, 0xfff, 0x3ff, 0x800, 0x5, 0x8, 0x927, 0x1, 0x8, 0x100000001, 0x200, 0x9, 0x8000000080000, 0x101, 0x40, 0x7ff, 0x8, 0x400, 0x4, 0x6, 0x2, 0x8, 0xf2c, 0x100, 0x8, 0xa2, 0x80000000, 0x800, 0x3ff, 0xe0c, 0x200, 0x5], {r4, r5+30000000}}) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffe95) close(r3) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:30 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00\x88\x00'}, &(0x7f0000000300)=0x54) 19:42:30 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x43, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 729.619541] IPVS: ftp: loaded support on port[0] = 21 [ 729.652779] IPVS: ftp: loaded support on port[0] = 21 19:42:30 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000040)={0x1, 0x0, 0x101, 0x400, 0x5, 0x3ff, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/11) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 729.676521] IPVS: ftp: loaded support on port[0] = 21 19:42:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xa00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:31 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ff807a13adc22956f0be06fa84708b19407291087f579ccc06d58d90a1b13a35abda69653eef84c5e99a9670deb8bf8ef9c3c7df2b966849053877687e011f2ebdac4eb0591cdb9e1ea6f5d3d6bbac10758aa3c2"], 0x2) close(r1) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000100)=""/234, &(0x7f0000000000)=0xea) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0xb971, 0x415, 0x1, 0x4, 0x0, 0x1, 0x4, 0x0, 0xa7, 0x2b, 0x1f, 0x1, 0x2, 0x400, 0x5, 0x1, 0x0, 0x1, 0x7, 0xf26, 0x3, 0x1, 0xfc, 0xfffffffffffffffa, 0x3, 0x9, 0xffffffffffffeb3e, 0x221, 0x8, 0x7fff, 0x4, 0xa70]}) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff80f0cbbca8ad1499976018f7b21c4c5441161725553433cdef67203caeb5a96cbe522ab9e4b7e17404261643095b07e3c8278ea2062015a7415f3aa6"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file1\x00', 0x7, 0xa, &(0x7f0000000780)=[{&(0x7f0000000100)="a15ab930949e3e04", 0x8, 0x7}, {&(0x7f0000000140)="530b289a27196efeb956f2037e02a6e46d0c8a87f05444161ccdbd28dcd43e63c02a39dec13c2e2773a1ea203ff2adbcaadbf86eb635c360fd8580b89fc2b463875c74d6d14b72b0ca964794997ff0a3534a867ce8dfe62adf62ce13887e21c278da07b60abf3683c748f96dea83034a6cc58c8d49a12100f8251ec90a26456f6ec2ed9316cad5fbde3b40ab928a5ff46fac9d9c051d9aacb41813145bf72398d5b2c7b425fc7ae18976028d887551", 0xaf, 0x88}, {&(0x7f0000000200)="9c98463fe18975e736da53b4df989ff9a18e83390e6376b8482c6d101d8deab610d35f8c62fdc40b4b8f6ba74a6cfcb6a9ff2e46fc86cb65dcd0ef780851245d14737b423b1586619efe9d9319eb0fda513f4720f38d8b1f1c558aa6e9ea1b377089695c00825bea53bf3817e6b2e24c75894f8183919db396cda65993f5eb7e01490cac2ba7815d8d0a94826a81ce97f76b2462a2fa8ef5a779bf7495965fee8057535a46cb9cf39110290d1d3ea218b1465c902513cd8f0aae80baab3ef13e83f0019c1db4e3970675cfbaecc5ad393f5d561b521401784a54f2", 0xdb, 0xfffffffffffffffd}, {&(0x7f0000000300)="90e66326de7449cee3bf1187993eaaea783c712e6f88e2b12a354ecf928f66a8cf5b57ac6d43c5593ad266d16cd3f0b93ac8f77950c6bdf0a336dccadd211c9ec3dc088ff4aeb849ef9396cf1562c4eb6f", 0x51, 0x1}, {&(0x7f00000003c0)="0289c812a58cf89dbbc00ca4e3", 0xd, 0x1a7b}, {&(0x7f00000004c0)="82636eb4c8ca5b4ae906e4a1baa6bb11c8f187726f88c2b2a8011898b883f136ad574407db31dc9efd4aaec455864f257fb16d7dbe0dd2b4c3e5a6df54eaafae2351ecaf22b8473b2920a986487d61e1a4bb514e991d41a1d9e3934fb5e084d556012b38a87e18017e52345a70d5d92230cf88d3f8c9e86fbce8d2b19228a330f44ad95fbe90742c057d4dc333baf8fd19cfb69b5eed21253ed4", 0x9a, 0x20}, {&(0x7f0000000580)="b77164f131adcaeaf1e96752336999fee909763fec7060b816178bfd502cd2a5c472fad10efb5bd35ef68a9dfbe08037653b3e5ad4ba7931ba061ecdae2822d0783c924abd67893f4ae7297620e392af34dc705c6c0a7d6b5288a71a80120d33cb3614d297219596912fbc49a57c0cd956eba31d102982a5dd424829f41f2b6840ba9bf5d2cf36ecce", 0x89, 0x6}, {&(0x7f0000000400)="50526a9d84e96a46646e54b59521057dd3598ffd4bbd150a03f4c8", 0x1b, 0x400}, {&(0x7f0000000640)="da55142f83d788c482d43246706beea8e88ac3fecbc03e49e1d6d85c168b67b62fe8303580d0f9255aa5c16c3b6ac5704202b2d351b2db354f5c9bcb36ecc825f796864be5bb9fde5b9f135eab42d8ad96bbd43331", 0x55, 0x836b}, {&(0x7f00000006c0)="ff4fec6d03a230c3e2597d678df3b7f7f998ae51f699088d996ee0b53dcae8ca8bfbc0090d9e54e1b84ef482b0b09030bc6785282311f46f5e958c49afec85602e7d7811d9889214ef5c54c11fbdbe2286a1594cfde2ee50eadb69b9a00efb6d0d69886602652075846d73852a1da893c146064d83ff5ee6ecd027bb5dee72e4e566660502306c775395f8d4c5f8", 0x8e, 0x7fffffff}], 0x80000, &(0x7f0000000440)={[{@fat=@codepage={'codepage', 0x3d, '864'}}, {@nodots='nodots'}], [{@audit='audit'}, {@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, '/dev/vhci\x00'}}]}) [ 730.445388] IPVS: ftp: loaded support on port[0] = 21 [ 730.527000] IPVS: ftp: loaded support on port[0] = 21 [ 730.585828] IPVS: ftp: loaded support on port[0] = 21 [ 732.162308] net_ratelimit: 20 callbacks suppressed [ 732.162317] protocol 88fb is buggy, dev hsr_slave_0 [ 732.172998] protocol 88fb is buggy, dev hsr_slave_1 [ 732.962038] protocol 88fb is buggy, dev hsr_slave_0 [ 732.967150] protocol 88fb is buggy, dev hsr_slave_1 [ 733.202092] protocol 88fb is buggy, dev hsr_slave_0 [ 733.207219] protocol 88fb is buggy, dev hsr_slave_1 [ 733.212015] protocol 88fb is buggy, dev hsr_slave_0 [ 733.217292] protocol 88fb is buggy, dev hsr_slave_1 [ 733.442206] protocol 88fb is buggy, dev hsr_slave_0 [ 733.447309] protocol 88fb is buggy, dev hsr_slave_1 19:42:35 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x74010000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:35 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000100)={0x6, [0x9, 0x5, 0xfcb, 0x3, 0x1ac7, 0x100, 0x1fffe00000000, 0x1, 0x1f, 0x100000001, 0x1ff, 0xffffffffffffffaa, 0x5, 0x4, 0xffffffffffffff00, 0xffffffff00000001, 0x1, 0x7, 0x10000, 0x8000, 0xfffffffffffffff7, 0x7fffffff, 0x6, 0x6, 0x0, 0xa3, 0xffffffffffffffe0, 0x2, 0x7fffffff, 0x2, 0x1, 0x8, 0x5, 0x20, 0xfffffffffffffffb, 0x1, 0x800000000, 0x200, 0x5, 0x8, 0x5, 0x5b01, 0x363, 0x401, 0x5, 0x43, 0x100000000000000, 0x1], 0xf}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:35 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x80001) pread64(r0, &(0x7f0000000100)=""/201, 0xc9, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0x5, 0xffffffff}) 19:42:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:35 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x44, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 19:42:35 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00\x00\x00\x01\x00'}, &(0x7f0000000300)=0x54) [ 734.409577] IPVS: ftp: loaded support on port[0] = 21 [ 734.440189] IPVS: ftp: loaded support on port[0] = 21 [ 734.444526] IPVS: ftp: loaded support on port[0] = 21 19:42:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:35 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x62020000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 734.770605] IPVS: ftp: loaded support on port[0] = 21 19:42:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 735.297034] IPVS: ftp: loaded support on port[0] = 21 19:42:36 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7fffffff, 0x800) [ 735.404431] IPVS: ftp: loaded support on port[0] = 21 19:42:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1000000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 735.491535] IPVS: ftp: loaded support on port[0] = 21 19:42:36 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x75010000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:36 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7fffffff, 0x800) 19:42:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 736.238590] IPVS: ftp: loaded support on port[0] = 21 [ 736.824041] IPVS: ftp: loaded support on port[0] = 21 [ 737.362057] net_ratelimit: 18 callbacks suppressed [ 737.362066] protocol 88fb is buggy, dev hsr_slave_0 [ 737.362088] protocol 88fb is buggy, dev hsr_slave_1 [ 737.367088] protocol 88fb is buggy, dev hsr_slave_1 [ 737.602068] protocol 88fb is buggy, dev hsr_slave_0 [ 737.607170] protocol 88fb is buggy, dev hsr_slave_1 [ 737.612357] protocol 88fb is buggy, dev hsr_slave_0 [ 737.617409] protocol 88fb is buggy, dev hsr_slave_1 [ 738.402028] protocol 88fb is buggy, dev hsr_slave_0 [ 738.407128] protocol 88fb is buggy, dev hsr_slave_1 19:42:39 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 738.805000] IPVS: ftp: loaded support on port[0] = 21 19:42:39 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00\x00\x00\x11\x00'}, &(0x7f0000000300)=0x54) 19:42:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1200000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:39 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7fffffff, 0x800) 19:42:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:39 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x82000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 738.997077] IPVS: ftp: loaded support on port[0] = 21 [ 739.058527] IPVS: ftp: loaded support on port[0] = 21 19:42:40 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1300000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 739.202047] protocol 88fb is buggy, dev hsr_slave_0 [ 739.280731] IPVS: ftp: loaded support on port[0] = 21 19:42:40 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:40 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/rt_acct\x00') close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 739.835906] IPVS: ftp: loaded support on port[0] = 21 [ 739.896562] IPVS: ftp: loaded support on port[0] = 21 19:42:42 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0xff0, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000140)=0x54) [ 741.610181] IPVS: ftp: loaded support on port[0] = 21 [ 741.868531] IPVS: ftp: loaded support on port[0] = 21 19:42:42 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00\x00\x00\x88\x00'}, &(0x7f0000000300)=0x54) 19:42:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, 0x0}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x20300) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000004c0)=""/4096, &(0x7f0000000040)=0x1000) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:42 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 19:42:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1500000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:42 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x82020000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:42 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000003c0)={'nat\x02\x00'}, &(0x7f0000000140)=0x54) [ 742.138780] IPVS: ftp: loaded support on port[0] = 21 [ 742.157456] IPVS: ftp: loaded support on port[0] = 21 [ 742.161550] binder: 26965:26973 BC_INCREFS_DONE u0000000000000000 no match [ 742.221370] IPVS: ftp: loaded support on port[0] = 21 19:42:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x1800000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:43 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x109000) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0xdc, 0xa2, 0x4, 0xffffffffffffff29}) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:43 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) [ 742.562048] net_ratelimit: 19 callbacks suppressed [ 742.562056] protocol 88fb is buggy, dev hsr_slave_0 [ 742.572163] protocol 88fb is buggy, dev hsr_slave_1 19:42:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x3f00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@timestamp], 0x1) 19:42:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x4000000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 743.205056] IPVS: ftp: loaded support on port[0] = 21 [ 743.210529] IPVS: ftp: loaded support on port[0] = 21 [ 743.352927] IPVS: ftp: loaded support on port[0] = 21 [ 743.362052] protocol 88fb is buggy, dev hsr_slave_0 [ 743.367170] protocol 88fb is buggy, dev hsr_slave_1 [ 743.602039] protocol 88fb is buggy, dev hsr_slave_0 [ 743.602082] protocol 88fb is buggy, dev hsr_slave_1 [ 743.607127] protocol 88fb is buggy, dev hsr_slave_1 [ 743.842074] protocol 88fb is buggy, dev hsr_slave_0 [ 743.847235] protocol 88fb is buggy, dev hsr_slave_1 [ 743.852398] protocol 88fb is buggy, dev hsr_slave_0 [ 745.703915] IPVS: ftp: loaded support on port[0] = 21 [ 745.910866] chnl_net:caif_netlink_parms(): no params data found [ 745.980349] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.002136] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.009392] device bridge_slave_0 entered promiscuous mode [ 746.034832] bridge0: port 2(bridge_slave_1) entered blocking state [ 746.041271] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.062911] device bridge_slave_1 entered promiscuous mode [ 746.084791] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 746.094726] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 746.140537] team0: Port device team_slave_0 added [ 746.148800] team0: Port device team_slave_1 added [ 746.208643] device hsr_slave_0 entered promiscuous mode [ 746.252411] device hsr_slave_1 entered promiscuous mode [ 746.338590] bridge0: port 2(bridge_slave_1) entered blocking state [ 746.345014] bridge0: port 2(bridge_slave_1) entered forwarding state [ 746.351648] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.358056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 746.479881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 746.545995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 746.553920] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.561025] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.569903] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 746.581507] 8021q: adding VLAN 0 to HW filter on device team0 [ 746.592841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 746.600399] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.606793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 746.668752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 746.685666] bridge0: port 2(bridge_slave_1) entered blocking state [ 746.692060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 746.711453] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 746.721608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 746.733816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 746.741546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 746.749272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 746.757242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 19:42:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x400080, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0xb20, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c000}, 0x1) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r3 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x800) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) close(r2) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000280)=0x100000001, 0x4) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:42:47 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000003c0)={'nat\x03\x00'}, &(0x7f0000000140)=0x54) 19:42:47 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, &(0x7f0000000300)=0x54) 19:42:47 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x88000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 746.765041] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 746.771896] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 746.838910] IPVS: ftp: loaded support on port[0] = 21 [ 746.838917] IPVS: ftp: loaded support on port[0] = 21 19:42:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 746.972841] IPVS: ftp: loaded support on port[0] = 21 [ 746.987219] 8021q: adding VLAN 0 to HW filter on device batadv0 19:42:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7d, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 747.719567] IPVS: ftp: loaded support on port[0] = 21 [ 747.762081] net_ratelimit: 25 callbacks suppressed [ 747.762090] protocol 88fb is buggy, dev hsr_slave_0 [ 747.772205] protocol 88fb is buggy, dev hsr_slave_1 [ 747.774367] protocol 88fb is buggy, dev hsr_slave_0 [ 747.779891] IPVS: ftp: loaded support on port[0] = 21 [ 747.782687] protocol 88fb is buggy, dev hsr_slave_1 [ 747.799114] IPVS: ftp: loaded support on port[0] = 21 19:42:48 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 19:42:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x2, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:48 executing program 4: 19:42:48 executing program 4: 19:42:48 executing program 2: 19:42:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0x22b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) [ 748.002034] protocol 88fb is buggy, dev hsr_slave_0 [ 748.007150] protocol 88fb is buggy, dev hsr_slave_1 [ 748.012312] protocol 88fb is buggy, dev hsr_slave_0 [ 748.017374] protocol 88fb is buggy, dev hsr_slave_1 [ 748.104484] device bridge_slave_1 left promiscuous mode [ 748.111922] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.187999] device bridge_slave_0 left promiscuous mode [ 748.193666] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.480184] device hsr_slave_1 left promiscuous mode [ 748.553845] device hsr_slave_0 left promiscuous mode [ 748.630697] team0 (unregistering): Port device team_slave_1 removed [ 748.721914] team0 (unregistering): Port device team_slave_0 removed [ 748.761544] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 748.800524] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 749.010159] bond0 (unregistering): Released all slaves [ 749.202079] protocol 88fb is buggy, dev hsr_slave_0 [ 749.207209] protocol 88fb is buggy, dev hsr_slave_1 19:42:51 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000003c0)={'nat\x04\x00'}, &(0x7f0000000140)=0x54) 19:42:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) getpid() perf_event_open(0x0, 0x0, 0x10, r0, 0x1) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000), 0x4) recvmmsg(r1, &(0x7f0000001cc0), 0x4000052, 0x10102, &(0x7f0000001540)={0x0, r2+10000000}) sendmsg$netlink(r1, &(0x7f0000000740)={&(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x60}, 0xc, &(0x7f0000000680)=[{&(0x7f0000000300)={0x10, 0x22, 0x501, 0x70bd2b, 0x25dfdbfc}, 0x10}], 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32=r1], 0x10, 0x20000000}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) [ 750.954233] IPVS: ftp: loaded support on port[0] = 21 19:42:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x181, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$bt_hci(r1, &(0x7f0000000080), 0xb) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000280)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, &(0x7f0000000100)) 19:42:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x3, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:51 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x8a000000, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 19:42:51 executing program 5: r0 = semget(0xffffffffffffffff, 0x4, 0x32) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0x44, 0x8001]) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00\x00\x00\x00\x00\x00\x00\x11\x00'}, &(0x7f0000000300)=0x54) [ 751.064669] IPVS: ftp: loaded support on port[0] = 21 [ 751.105508] IPVS: ftp: loaded support on port[0] = 21 19:42:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0xc, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x7d, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x104, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0xff03, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) 19:42:52 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0xb93c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x13f}}, 0x20) exit_group(0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x249) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) flistxattr(r2, &(0x7f0000000000)=""/14, 0xe) [ 751.907301] IPVS: ftp: loaded support on port[0] = 21 [ 752.018599] IPVS: ftp: loaded support on port[0] = 21 [ 752.043119] IPVS: ftp: loaded support on port[0] = 21 19:42:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000400000, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100, 0x0, 0x300000000000000]}, 0x2c) [ 753.303603] WARNING: CPU: 0 PID: 2607 at net/ipv6/xfrm6_tunnel.c:351 xfrm6_tunnel_net_exit+0x1df/0x370 [ 753.313082] Kernel panic - not syncing: panic_on_warn set ... [ 753.318974] CPU: 0 PID: 2607 Comm: kworker/u4:4 Not tainted 5.0.0-rc7+ #84 [ 753.325985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.335372] Workqueue: netns cleanup_net [ 753.339432] Call Trace: [ 753.342026] dump_stack+0x172/0x1f0 [ 753.345658] ? xfrm6_tunnel_net_exit+0x1c0/0x370 [ 753.350492] panic+0x2cb/0x65c [ 753.353701] ? __warn_printk+0xf3/0xf3 [ 753.357594] ? xfrm6_tunnel_net_exit+0x1df/0x370 [ 753.362346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.367883] ? __warn.cold+0x5/0x45 [ 753.371510] ? __warn+0xe8/0x1d0 [ 753.374878] ? xfrm6_tunnel_net_exit+0x1df/0x370 [ 753.379633] __warn.cold+0x20/0x45 [ 753.383175] ? xfrm6_tunnel_net_exit+0x1df/0x370 [ 753.387935] report_bug+0x263/0x2b0 [ 753.391615] do_error_trap+0x11b/0x200 [ 753.395511] do_invalid_op+0x37/0x50 [ 753.399226] ? xfrm6_tunnel_net_exit+0x1df/0x370 [ 753.403987] invalid_op+0x14/0x20 [ 753.407450] RIP: 0010:xfrm6_tunnel_net_exit+0x1df/0x370 [ 753.412812] Code: 4c 89 e0 48 c1 e8 03 42 80 3c 38 00 0f 85 73 01 00 00 4d 8b 34 24 31 ff 4c 89 f6 e8 0b b0 55 fb 4d 85 f6 74 b3 e8 61 ae 55 fb <0f> 0b eb aa 48 81 c3 00 08 00 00 45 31 e4 49 be 00 00 00 00 00 fc [ 753.431887] RSP: 0018:ffff8880a0c0fbe0 EFLAGS: 00010293 [ 753.437340] RAX: ffff8880a13f4700 RBX: ffff888095378700 RCX: ffffffff861a3315 [ 753.444611] RDX: 0000000000000000 RSI: ffffffff861a331f RDI: 0000000000000007 [ 753.451876] RBP: ffff8880a0c0fc08 R08: ffff8880a13f4700 R09: ffff8880a13f4ff0 [ 753.459142] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888095378e78 [ 753.466410] R13: 00000000000000ef R14: ffff888057ce8780 R15: dffffc0000000000 [ 753.473710] ? xfrm6_tunnel_net_exit+0x1d5/0x370 [ 753.478465] ? xfrm6_tunnel_net_exit+0x1df/0x370 [ 753.483230] ? xfrm6_tunnel_alloc_spi+0x920/0x920 [ 753.488080] ops_exit_list.isra.0+0xb0/0x160 [ 753.492491] cleanup_net+0x3fb/0x960 [ 753.496208] ? netns_install+0x1d0/0x1d0 [ 753.500271] ? __lock_is_held+0xb6/0x140 [ 753.504340] ? check_preemption_disabled+0x48/0x290 [ 753.509367] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 753.514875] process_one_work+0x98e/0x1790 [ 753.519125] ? pwq_dec_nr_in_flight+0x320/0x320 [ 753.523799] ? lock_acquire+0x16f/0x3f0 [ 753.527789] worker_thread+0x98/0xe40 [ 753.531635] ? trace_hardirqs_on+0x67/0x230 [ 753.535990] kthread+0x357/0x430 [ 753.539359] ? process_one_work+0x1790/0x1790 [ 753.543865] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 753.549408] ret_from_fork+0x3a/0x50 [ 753.554899] Kernel Offset: disabled [ 753.558685] Rebooting in 86400 seconds..