Warning: Permanently added '10.128.0.189' (ECDSA) to the list of known hosts. 2019/11/26 19:55:37 fuzzer started 2019/11/26 19:55:39 dialing manager at 10.128.0.105:46511 2019/11/26 19:55:39 syscalls: 2566 2019/11/26 19:55:39 code coverage: enabled 2019/11/26 19:55:39 comparison tracing: enabled 2019/11/26 19:55:39 extra coverage: extra coverage is not supported by the kernel 2019/11/26 19:55:39 setuid sandbox: enabled 2019/11/26 19:55:39 namespace sandbox: enabled 2019/11/26 19:55:39 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/26 19:55:39 fault injection: enabled 2019/11/26 19:55:39 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/26 19:55:39 net packet injection: enabled 2019/11/26 19:55:39 net device setup: enabled 2019/11/26 19:55:39 concurrency sanitizer: enabled 2019/11/26 19:55:39 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/26 19:55:40 adding functions to KCSAN blacklist: 'tomoyo_supervisor' 'ext4_has_free_clusters' 'tcp_add_backlog' 'find_get_pages_range_tag' 'run_timer_softirq' 'add_timer' 'find_next_bit' '__ext4_new_inode' '__hrtimer_run_queues' 19:55:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) 19:55:42 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c961050000001d48e56c969a3547034571923a2c0e75ecb75217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731bd6a16792b1319e2acc0eb1ba8116a4ae39f9465a4cf19d78a656c9c9ab39cc56dcf882cf3634e82b4d1f8e00b92c49a9fc3b9ed49f55dcd880fdac079d00eb23ad6da7c30c7dce2818616267e875a9c69d0ab4aa1c2b9b92762bfa0757e20c117d6d2c681e45c728509f9bb9c514d374957c6c2c35e80f5b1e8bea870c02923c1c056ca60d174593bc67f1786ad16c0e5dff449757f03e8b552cee06e007ac8b37bfc45d6af375213cfc2400d42"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321212e0f2bf8b05fb751f0692bb701fe6eda817ea590092b3c8262a0430335c07a356443298afb7cd50a7fdd085f397b9312f9857f5db5b487dfd1e759f331af979a0f2cc1765e2bf760ff66e91a0022549050d0f9f5082a781aea2e161e20b0a79088465254eb8fcc59ddd3cec25c0a2448bebb58e17a956d29b9bce9a7fe5d50fe272a62c4ff00edca07e5ed07e1"], 0x10094) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000840)={0x0, 0x0, 0x20}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="f5", 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0x13400) syzkaller login: [ 58.025296][ T7576] IPVS: ftp: loaded support on port[0] = 21 [ 58.107911][ T7576] chnl_net:caif_netlink_parms(): no params data found [ 58.170719][ T7576] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.177809][ T7576] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.185725][ T7576] device bridge_slave_0 entered promiscuous mode [ 58.200728][ T7576] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.207911][ T7576] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.220344][ T7576] device bridge_slave_1 entered promiscuous mode [ 58.232345][ T7579] IPVS: ftp: loaded support on port[0] = 21 [ 58.243073][ T7576] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.263127][ T7576] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 19:55:43 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) [ 58.299727][ T7576] team0: Port device team_slave_0 added [ 58.331438][ T7576] team0: Port device team_slave_1 added [ 58.361429][ T7579] chnl_net:caif_netlink_parms(): no params data found [ 58.481138][ T7576] device hsr_slave_0 entered promiscuous mode 19:55:43 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001440)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000000000000080005000200000000000001f36b6744254ffe2e4173a157dcd8d2476d04795b93bfc6c1b407dcb7d4380144abbbb4bc9481b435845656e6f859b78cc7d5ece9a6f60d9485b06f1ffb80abb4b501000000000c6d757a3cc10ed9abb13edfa687a7d02808a5605d1b73d76ea549e2012287087c9acc01ec28b742f70000000000000076dc99133f08000000232b013034197c9ff810d6f56c338fe8f6f900f8a14c6fd77505d76a2b09317034abef015aa5a0e80a088ea01a359db98701000000e0190f43ea540e1b00"/235, @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) [ 58.560017][ T7576] device hsr_slave_1 entered promiscuous mode [ 58.607111][ T7582] IPVS: ftp: loaded support on port[0] = 21 [ 58.709692][ T7576] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.716805][ T7576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.724131][ T7576] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.731180][ T7576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.861633][ T7579] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.868779][ T7579] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.904909][ T7579] device bridge_slave_0 entered promiscuous mode [ 58.954240][ T7608] IPVS: ftp: loaded support on port[0] = 21 [ 58.960917][ T7579] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.967968][ T7579] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.999885][ T7579] device bridge_slave_1 entered promiscuous mode 19:55:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 59.101675][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.139640][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.178335][ T7579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.211137][ T7576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.230297][ T7579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.266495][ T7582] chnl_net:caif_netlink_parms(): no params data found [ 59.284093][ T7576] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.328535][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.337202][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.413748][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.429608][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.438093][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.445330][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.519642][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.528557][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.579475][ T3017] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.586541][ T3017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.619601][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.629570][ T7579] team0: Port device team_slave_0 added [ 59.687073][ T7579] team0: Port device team_slave_1 added [ 59.702584][ T7582] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.720660][ T7582] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.728773][ T7582] device bridge_slave_0 entered promiscuous mode [ 59.765190][ T7576] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 59.799137][ T7576] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 59.834187][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.861285][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.891524][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.911468][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 19:55:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newsa={0x180, 0x10, 0x713, 0x0, 0x0, {{@in6=@rand_addr="db1f41a937ce0ec58c12479acc88549b", @in=@dev}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'xchacha12-simd\x00'}}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x180}}, 0x0) [ 59.939958][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.971675][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.011394][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.040346][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.071226][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.100082][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.108637][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.152813][ T7612] IPVS: ftp: loaded support on port[0] = 21 [ 60.164988][ T7582] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.192869][ T7582] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.201519][ T7582] device bridge_slave_1 entered promiscuous mode [ 60.216764][ T7608] chnl_net:caif_netlink_parms(): no params data found [ 60.261649][ T7579] device hsr_slave_0 entered promiscuous mode [ 60.279505][ T7579] device hsr_slave_1 entered promiscuous mode [ 60.329182][ T7579] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.369858][ T7608] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.376985][ T7608] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.384851][ T7608] device bridge_slave_0 entered promiscuous mode [ 60.392874][ T7582] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.403077][ T7582] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.424252][ T7582] team0: Port device team_slave_0 added [ 60.431108][ T7582] team0: Port device team_slave_1 added [ 60.437043][ T7608] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.444363][ T7608] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.452022][ T7608] device bridge_slave_1 entered promiscuous mode [ 60.507337][ T7608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.513124][ T7622] IPVS: ftp: loaded support on port[0] = 21 [ 60.543564][ T7576] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.558599][ T7608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.589636][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.597093][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.631013][ T7582] device hsr_slave_0 entered promiscuous mode [ 60.679397][ T7582] device hsr_slave_1 entered promiscuous mode [ 60.729220][ T7582] debugfs: Directory 'hsr0' with parent '/' already present! [ 60.784592][ T7608] team0: Port device team_slave_0 added [ 60.807182][ T7608] team0: Port device team_slave_1 added [ 61.037262][ T7579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.121177][ T7608] device hsr_slave_0 entered promiscuous mode [ 61.151724][ T7608] device hsr_slave_1 entered promiscuous mode [ 61.179284][ T7608] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.201579][ T7612] chnl_net:caif_netlink_parms(): no params data found [ 61.270453][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.309542][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.460969][ T7579] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.635054][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.699817][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 19:55:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) [ 61.791467][ T7611] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.798536][ T7611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.909695][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.918300][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.994552][ T7611] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.001644][ T7611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.098832][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.163522][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.226808][ T7622] chnl_net:caif_netlink_parms(): no params data found [ 62.295376][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.362246][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.404754][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 19:55:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) [ 62.502651][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.534291][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.619987][ T7612] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.627040][ T7612] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.683342][ T7612] device bridge_slave_0 entered promiscuous mode [ 62.752001][ T7579] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 62.829226][ T7579] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.902192][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.931059][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.995893][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.063920][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.128216][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.204626][ T7612] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.271921][ T7612] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.314090][ T7612] device bridge_slave_1 entered promiscuous mode [ 63.364667][ T7582] 8021q: adding VLAN 0 to HW filter on device bond0 19:55:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) [ 63.466835][ T7608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.522261][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.549987][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 63.557448][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.635552][ T7579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.661718][ T7622] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.671001][ T7622] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.705604][ T7622] device bridge_slave_0 entered promiscuous mode [ 63.749715][ T7622] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.756797][ T7622] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.835308][ T7622] device bridge_slave_1 entered promiscuous mode [ 63.888833][ T7582] 8021q: adding VLAN 0 to HW filter on device team0 19:55:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) [ 63.936543][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.947546][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.993506][ T7612] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.045268][ T7622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.075408][ T7608] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.112250][ T7612] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.143579][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.189700][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.197503][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 19:55:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) [ 64.245133][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.309484][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.316549][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.374493][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.400756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.430060][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.437128][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.488051][ T7622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.518013][ T7582] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.546437][ T7582] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.591603][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:55:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) [ 64.635500][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.664441][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.674000][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.688424][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.707617][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.721938][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.730622][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.738972][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.747315][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.755768][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.764099][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.772899][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.781372][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.788398][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.796424][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.804990][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.813348][ T3017] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.820546][ T3017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.828464][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.841898][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.851495][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.858981][ T7611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.872296][ T7612] team0: Port device team_slave_0 added [ 64.880147][ T7612] team0: Port device team_slave_1 added [ 64.927340][ T7622] team0: Port device team_slave_0 added [ 64.950834][ T7622] team0: Port device team_slave_1 added [ 64.957483][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 19:55:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) [ 64.979891][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.996473][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.014188][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.023090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.032052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.042363][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 19:55:49 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c961050000001d48e56c969a3547034571923a2c0e75ecb75217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731bd6a16792b1319e2acc0eb1ba8116a4ae39f9465a4cf19d78a656c9c9ab39cc56dcf882cf3634e82b4d1f8e00b92c49a9fc3b9ed49f55dcd880fdac079d00eb23ad6da7c30c7dce2818616267e875a9c69d0ab4aa1c2b9b92762bfa0757e20c117d6d2c681e45c728509f9bb9c514d374957c6c2c35e80f5b1e8bea870c02923c1c056ca60d174593bc67f1786ad16c0e5dff449757f03e8b552cee06e007ac8b37bfc45d6af375213cfc2400d42"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321212e0f2bf8b05fb751f0692bb701fe6eda817ea590092b3c8262a0430335c07a356443298afb7cd50a7fdd085f397b9312f9857f5db5b487dfd1e759f331af979a0f2cc1765e2bf760ff66e91a0022549050d0f9f5082a781aea2e161e20b0a79088465254eb8fcc59ddd3cec25c0a2448bebb58e17a956d29b9bce9a7fe5d50fe272a62c4ff00edca07e5ed07e1"], 0x10094) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000840)={0x0, 0x0, 0x20}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="f5", 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0x13400) [ 65.121403][ T7612] device hsr_slave_0 entered promiscuous mode [ 65.159493][ T7612] device hsr_slave_1 entered promiscuous mode [ 65.221954][ T7612] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.244490][ T7608] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.256501][ T7608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.265327][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.274855][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.282468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.290058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.298302][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.318467][ T7582] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.401334][ T7622] device hsr_slave_0 entered promiscuous mode [ 65.441936][ T7622] device hsr_slave_1 entered promiscuous mode [ 65.499254][ T7622] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.533226][ T7608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.545946][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.572629][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.745882][ T7612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.812674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.849579][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.911510][ T7612] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.963357][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.985934][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.039687][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.046849][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.165624][ T7622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.200009][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.242692][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 19:55:51 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) [ 66.299923][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.326708][ T7601] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.333827][ T7601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.398644][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.455096][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.538962][ T7622] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.593665][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.611182][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.653834][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.693496][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.745023][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.812490][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.846924][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.899622][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.908125][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.979803][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.989763][ T7612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.038107][ T7612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.143880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.170503][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.213524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 19:55:51 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001440)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000000000000080005000200000000000001f36b6744254ffe2e4173a157dcd8d2476d04795b93bfc6c1b407dcb7d4380144abbbb4bc9481b435845656e6f859b78cc7d5ece9a6f60d9485b06f1ffb80abb4b501000000000c6d757a3cc10ed9abb13edfa687a7d02808a5605d1b73d76ea549e2012287087c9acc01ec28b742f70000000000000076dc99133f08000000232b013034197c9ff810d6f56c338fe8f6f900f8a14c6fd77505d76a2b09317034abef015aa5a0e80a088ea01a359db98701000000e0190f43ea540e1b00"/235, @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) [ 67.269505][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.276586][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.329799][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.337248][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.419427][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.428335][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.499538][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.506750][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.552760][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.593958][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.625920][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.682647][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.720720][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.772514][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.869856][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.919881][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.961447][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.013664][ T7622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.052810][ T7622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.109292][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.117909][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.155701][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.236256][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.261922][ T7601] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.312306][ T7622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.445216][ C0] hrtimer: interrupt took 32376 ns 19:55:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) 19:55:53 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321212e0f2bf8b05fb751f0692bb701fe6eda817ea590092b3c8262a0430335c07a356443298afb7cd50a7fdd085f397b9312f9857f5db5b487dfd1e759f331af979a0f2cc1765e2bf760ff66e91a0022549050d0f9f5082a781aea2e161e20b0a79088465254eb8fcc59ddd3cec25c0a2448bebb58e17a956d29b9bce9a7fe5d50fe272a62c4ff00edca07e5ed07e1"], 0x10094) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000840)={0x0, 0x0, 0x20}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="f5", 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0x13400) 19:55:53 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) 19:55:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001440)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000000000000080005000200000000000001f36b6744254ffe2e4173a157dcd8d2476d04795b93bfc6c1b407dcb7d4380144abbbb4bc9481b435845656e6f859b78cc7d5ece9a6f60d9485b06f1ffb80abb4b501000000000c6d757a3cc10ed9abb13edfa687a7d02808a5605d1b73d76ea549e2012287087c9acc01ec28b742f70000000000000076dc99133f08000000232b013034197c9ff810d6f56c338fe8f6f900f8a14c6fd77505d76a2b09317034abef015aa5a0e80a088ea01a359db98701000000e0190f43ea540e1b00"/235, @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 19:55:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newsa={0x180, 0x10, 0x713, 0x0, 0x0, {{@in6=@rand_addr="db1f41a937ce0ec58c12479acc88549b", @in=@dev}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'xchacha12-simd\x00'}}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x180}}, 0x0) 19:55:53 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x2, &(0x7f00006ed000), &(0x7f0000000080)=0x4) 19:55:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newsa={0x180, 0x10, 0x713, 0x0, 0x0, {{@in6=@rand_addr="db1f41a937ce0ec58c12479acc88549b", @in=@dev}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'xchacha12-simd\x00'}}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x180}}, 0x0) 19:55:53 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) 19:55:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001440)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000000000000080005000200000000000001f36b6744254ffe2e4173a157dcd8d2476d04795b93bfc6c1b407dcb7d4380144abbbb4bc9481b435845656e6f859b78cc7d5ece9a6f60d9485b06f1ffb80abb4b501000000000c6d757a3cc10ed9abb13edfa687a7d02808a5605d1b73d76ea549e2012287087c9acc01ec28b742f70000000000000076dc99133f08000000232b013034197c9ff810d6f56c338fe8f6f900f8a14c6fd77505d76a2b09317034abef015aa5a0e80a088ea01a359db98701000000e0190f43ea540e1b00"/235, @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 19:55:53 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321212e0f2bf8b05fb751f0692bb701fe6eda817ea590092b3c8262a0430335c07a356443298afb7cd50a7fdd085f397b9312f9857f5db5b487dfd1e759f331af979a0f2cc1765e2bf760ff66e91a0022549050d0f9f5082a781aea2e161e20b0a79088465254eb8fcc59ddd3cec25c0a2448bebb58e17a956d29b9bce9a7fe5d50fe272a62c4ff00edca07e5ed07e1"], 0x10094) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000840)={0x0, 0x0, 0x20}, 0xc) sendto$inet6(r0, &(0x7f00000003c0)="f5", 0x1, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0x13400) 19:55:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newsa={0x180, 0x10, 0x713, 0x0, 0x0, {{@in6=@rand_addr="db1f41a937ce0ec58c12479acc88549b", @in=@dev}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'xchacha12-simd\x00'}}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x180}}, 0x0) 19:55:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001440)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000000000000080005000200000000000001f36b6744254ffe2e4173a157dcd8d2476d04795b93bfc6c1b407dcb7d4380144abbbb4bc9481b435845656e6f859b78cc7d5ece9a6f60d9485b06f1ffb80abb4b501000000000c6d757a3cc10ed9abb13edfa687a7d02808a5605d1b73d76ea549e2012287087c9acc01ec28b742f70000000000000076dc99133f08000000232b013034197c9ff810d6f56c338fe8f6f900f8a14c6fd77505d76a2b09317034abef015aa5a0e80a088ea01a359db98701000000e0190f43ea540e1b00"/235, @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 19:55:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:56 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) 19:55:57 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001440)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000000000000080005000200000000000001f36b6744254ffe2e4173a157dcd8d2476d04795b93bfc6c1b407dcb7d4380144abbbb4bc9481b435845656e6f859b78cc7d5ece9a6f60d9485b06f1ffb80abb4b501000000000c6d757a3cc10ed9abb13edfa687a7d02808a5605d1b73d76ea549e2012287087c9acc01ec28b742f70000000000000076dc99133f08000000232b013034197c9ff810d6f56c338fe8f6f900f8a14c6fd77505d76a2b09317034abef015aa5a0e80a088ea01a359db98701000000e0190f43ea540e1b00"/235, @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 19:55:57 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) 19:55:57 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) 19:55:57 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001440)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000000000000080005000200000000000001f36b6744254ffe2e4173a157dcd8d2476d04795b93bfc6c1b407dcb7d4380144abbbb4bc9481b435845656e6f859b78cc7d5ece9a6f60d9485b06f1ffb80abb4b501000000000c6d757a3cc10ed9abb13edfa687a7d02808a5605d1b73d76ea549e2012287087c9acc01ec28b742f70000000000000076dc99133f08000000232b013034197c9ff810d6f56c338fe8f6f900f8a14c6fd77505d76a2b09317034abef015aa5a0e80a088ea01a359db98701000000e0190f43ea540e1b00"/235, @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 19:55:57 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) 19:55:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x101, 0x5, 0x7, 0x2, {0x4, 0x0, 0x0, 0x0, 0x1, 0x6, 0x7, 0xf9, 0x20, 0x12, 0x0, 0x6, 0x81, 0x0, "c34d888a52725f26c327cb694da53ce546e1e089c37c009039f72fdd0c848ef0"}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) add_key(&(0x7f00000001c0)='.dead\x00w\f\xdc\x1c\xc22M\x1a\xae\x0e\xc0\xd9\xf4zp\b\x87\x13\xaf\x1diSc\xd0\xe61#\xf72\n}\x99\xd5\xae\x0e\x1f6\x03\xd5y\xe4q\xf4e\xe9\xf1L\xce\x96\xeeR\xe7\xfb\xb69gV\xbd\x11\xfe\xc5\xaf\xb0\fq,(\xb9\xb1\xcb\n\x1d\xa9\x18', 0x0, &(0x7f0000001000)="1c98", 0x2, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:55:57 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) 19:55:57 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000000ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab501808b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) chmod(&(0x7f0000000380)='./file0\x00', 0x0) [ 73.020744][ T10] ================================================================== [ 73.028883][ T10] BUG: KCSAN: data-race in rcu_gp_fqs_check_wake / rcu_note_context_switch [ 73.037446][ T10] [ 73.039769][ T10] write to 0xffffffff85a7d1d0 of 8 bytes by task 7576 on cpu 0: [ 73.047386][ T10] rcu_note_context_switch+0x6f6/0x760 [ 73.052923][ T10] __schedule+0xa4/0x690 [ 73.057157][ T10] preempt_schedule_common+0x37/0x90 [ 73.062433][ T10] preempt_schedule+0x30/0x40 [ 73.067108][ T10] ___preempt_schedule+0x16/0x20 [ 73.072033][ T10] _raw_spin_unlock_irq+0x74/0x80 [ 73.077044][ T10] __flush_work+0x216/0x390 [ 73.081533][ T10] flush_delayed_work+0x8a/0xe0 [ 73.086379][ T10] wb_shutdown+0x108/0x1e0 [ 73.090780][ T10] bdi_unregister+0xab/0x3a0 [ 73.095352][ T10] bdi_put+0x112/0x130 [ 73.099413][ T10] generic_shutdown_super+0x219/0x260 [ 73.104774][ T10] kill_anon_super+0x2f/0x50 [ 73.109350][ T10] v9fs_kill_super+0x38/0x70 [ 73.113927][ T10] deactivate_locked_super+0x64/0xb0 [ 73.119198][ T10] deactivate_super+0xca/0xe0 [ 73.123868][ T10] cleanup_mnt+0x27f/0x330 [ 73.128271][ T10] __cleanup_mnt+0x1f/0x30 [ 73.132679][ T10] task_work_run+0xf6/0x130 [ 73.137174][ T10] exit_to_usermode_loop+0x2b4/0x2c0 [ 73.142447][ T10] do_syscall_64+0x353/0x370 [ 73.147024][ T10] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 73.152890][ T10] [ 73.155209][ T10] read to 0xffffffff85a7d1d0 of 8 bytes by task 10 on cpu 1: [ 73.162561][ T10] rcu_gp_fqs_check_wake+0x93/0xd0 [ 73.167660][ T10] rcu_gp_fqs_loop+0x36c/0x580 [ 73.172408][ T10] rcu_gp_kthread+0x143/0x230 [ 73.177067][ T10] kthread+0x1d4/0x200 [ 73.181132][ T10] ret_from_fork+0x1f/0x30 [ 73.185525][ T10] [ 73.187834][ T10] Reported by Kernel Concurrency Sanitizer on: [ 73.193977][ T10] CPU: 1 PID: 10 Comm: rcu_preempt Not tainted 5.4.0-syzkaller #0 [ 73.201761][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.211805][ T10] ================================================================== [ 73.219853][ T10] Kernel panic - not syncing: panic_on_warn set ... [ 73.226427][ T10] CPU: 1 PID: 10 Comm: rcu_preempt Not tainted 5.4.0-syzkaller #0 [ 73.234219][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.244257][ T10] Call Trace: [ 73.247538][ T10] dump_stack+0x11d/0x181 [ 73.251865][ T10] panic+0x210/0x640 [ 73.255751][ T10] ? vprintk_func+0x8d/0x140 [ 73.260338][ T10] kcsan_report.cold+0xc/0xd [ 73.264920][ T10] kcsan_setup_watchpoint+0x3fe/0x460 [ 73.270288][ T10] __tsan_read8+0xc6/0x100 [ 73.274692][ T10] rcu_gp_fqs_check_wake+0x93/0xd0 [ 73.279793][ T10] rcu_gp_fqs_loop+0x36c/0x580 [ 73.284547][ T10] rcu_gp_kthread+0x143/0x230 [ 73.289213][ T10] kthread+0x1d4/0x200 [ 73.293271][ T10] ? rcu_gp_cleanup+0x520/0x520 [ 73.298110][ T10] ? kthread_stop+0x2d0/0x2d0 [ 73.302775][ T10] ret_from_fork+0x1f/0x30 [ 73.308410][ T10] Kernel Offset: disabled [ 73.312733][ T10] Rebooting in 86400 seconds..