[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 69.533439][ T26] audit: type=1800 audit(1577034616.855:25): pid=9201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 69.568839][ T26] audit: type=1800 audit(1577034616.865:26): pid=9201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 69.606033][ T26] audit: type=1800 audit(1577034616.865:27): pid=9201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.243' (ECDSA) to the list of known hosts. 2019/12/22 17:10:28 fuzzer started 2019/12/22 17:10:30 dialing manager at 10.128.0.26:34931 2019/12/22 17:10:30 syscalls: 2707 2019/12/22 17:10:30 code coverage: enabled 2019/12/22 17:10:30 comparison tracing: enabled 2019/12/22 17:10:30 extra coverage: enabled 2019/12/22 17:10:30 setuid sandbox: enabled 2019/12/22 17:10:30 namespace sandbox: enabled 2019/12/22 17:10:30 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/22 17:10:30 fault injection: enabled 2019/12/22 17:10:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/22 17:10:30 net packet injection: enabled 2019/12/22 17:10:30 net device setup: enabled 2019/12/22 17:10:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/22 17:10:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:12:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, 0x0, 0x0) 17:12:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nr0\x00', 0x1000}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81\n?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') syzkaller login: [ 230.736822][ T9366] IPVS: ftp: loaded support on port[0] = 21 [ 230.928510][ T9366] chnl_net:caif_netlink_parms(): no params data found [ 230.990901][ T9369] IPVS: ftp: loaded support on port[0] = 21 [ 231.035681][ T9366] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.058026][ T9366] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.065852][ T9366] device bridge_slave_0 entered promiscuous mode 17:12:58 executing program 2: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)='/', 0x1}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f00000000c0)={0x1, 0x0, 0xf, 0x0, 0x0, &(0x7f00000004c0)}) [ 231.091490][ T9366] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.108144][ T9366] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.128381][ T9366] device bridge_slave_1 entered promiscuous mode [ 231.211790][ T9366] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.267541][ T9371] IPVS: ftp: loaded support on port[0] = 21 [ 231.276613][ T9366] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 17:12:58 executing program 3: syz_open_dev$dri(&(0x7f00000003c0)='/dev/dri/card#\x00', 0x2, 0x0) [ 231.387109][ T9366] team0: Port device team_slave_0 added [ 231.396666][ T9369] chnl_net:caif_netlink_parms(): no params data found [ 231.413236][ T9366] team0: Port device team_slave_1 added [ 231.581336][ T9366] device hsr_slave_0 entered promiscuous mode 17:12:59 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$packet(0x11, 0x0, 0x300) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f000000ac80), 0x66, 0x86dd) [ 231.690859][ T9366] device hsr_slave_1 entered promiscuous mode [ 231.772239][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.798427][ T9369] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.807490][ T9369] device bridge_slave_0 entered promiscuous mode [ 231.831371][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.847992][ T9369] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.856209][ T9369] device bridge_slave_1 entered promiscuous mode [ 231.877344][ T9374] IPVS: ftp: loaded support on port[0] = 21 [ 231.953406][ T9371] chnl_net:caif_netlink_parms(): no params data found [ 231.969562][ T9369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 17:12:59 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$packet(0x11, 0x0, 0x300) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000005c0)={0x7b, 0x5, [0x481], [0xc1]}) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000040)={0x38, 0x0, 0x4, [{0x5, 0xfffffffffffffff9, 0xd, 0x2, 'nodev!trusted'}]}, 0x38) syz_open_procfs(0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f000000ac80), 0x66, 0x86dd) [ 232.040172][ T9369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.051723][ T9376] IPVS: ftp: loaded support on port[0] = 21 [ 232.089118][ T9366] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 232.165637][ T9366] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 232.232521][ T9366] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 232.301686][ T9366] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 232.378743][ T9369] team0: Port device team_slave_0 added [ 232.411126][ T9369] team0: Port device team_slave_1 added [ 232.431235][ T9371] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.439385][ T9371] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.447237][ T9371] device bridge_slave_0 entered promiscuous mode [ 232.456733][ T9371] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.463952][ T9371] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.471881][ T9371] device bridge_slave_1 entered promiscuous mode [ 232.498638][ T9379] IPVS: ftp: loaded support on port[0] = 21 [ 232.504916][ T9371] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.547565][ T9371] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.621344][ T9369] device hsr_slave_0 entered promiscuous mode [ 232.669325][ T9369] device hsr_slave_1 entered promiscuous mode [ 232.738026][ T9369] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.875399][ T9371] team0: Port device team_slave_0 added [ 232.896189][ T9371] team0: Port device team_slave_1 added [ 232.911474][ T9374] chnl_net:caif_netlink_parms(): no params data found [ 232.944565][ T9376] chnl_net:caif_netlink_parms(): no params data found [ 233.020932][ T9371] device hsr_slave_0 entered promiscuous mode [ 233.069268][ T9371] device hsr_slave_1 entered promiscuous mode [ 233.108030][ T9371] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.133822][ T9369] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 233.206516][ T9374] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.214417][ T9374] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.222488][ T9374] device bridge_slave_0 entered promiscuous mode [ 233.233853][ T9374] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.241101][ T9374] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.249083][ T9374] device bridge_slave_1 entered promiscuous mode [ 233.263577][ T9369] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 233.313763][ T9369] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 233.373843][ T9369] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 233.473472][ T9374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.543353][ T9374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.584319][ T9376] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.592429][ T9376] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.600924][ T9376] device bridge_slave_0 entered promiscuous mode [ 233.613327][ T9374] team0: Port device team_slave_0 added [ 233.620275][ T9379] chnl_net:caif_netlink_parms(): no params data found [ 233.630290][ T9371] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 233.695508][ T9366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.703337][ T9376] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.711003][ T9376] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.719594][ T9376] device bridge_slave_1 entered promiscuous mode [ 233.729344][ T9374] team0: Port device team_slave_1 added [ 233.745113][ T9371] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 233.822358][ T9371] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 233.873508][ T9371] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 233.956190][ T9376] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.970601][ T9376] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.007427][ T3326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.016438][ T3326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.091489][ T9374] device hsr_slave_0 entered promiscuous mode [ 234.128242][ T9374] device hsr_slave_1 entered promiscuous mode [ 234.178096][ T9374] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.191361][ T9379] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.199087][ T9379] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.207042][ T9379] device bridge_slave_0 entered promiscuous mode [ 234.217044][ T9376] team0: Port device team_slave_0 added [ 234.229687][ T9366] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.244400][ T9379] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.252377][ T9379] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.260620][ T9379] device bridge_slave_1 entered promiscuous mode [ 234.282101][ T9376] team0: Port device team_slave_1 added [ 234.331307][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.343015][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.352315][ T3048] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.359597][ T3048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.421612][ T9376] device hsr_slave_0 entered promiscuous mode [ 234.478405][ T9376] device hsr_slave_1 entered promiscuous mode [ 234.538022][ T9376] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.550175][ T9379] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.559622][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.570020][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.578900][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.587257][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.594357][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.603233][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.611913][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.630619][ T9374] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 234.670515][ T9374] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 234.720343][ T9374] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 234.762554][ T9379] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.802522][ T9374] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 234.851335][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.861550][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.870547][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.884890][ T9379] team0: Port device team_slave_0 added [ 234.893155][ T9379] team0: Port device team_slave_1 added [ 234.931298][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.940981][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.956480][ T9369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.972027][ T9376] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 235.022709][ T9376] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 235.161643][ T9379] device hsr_slave_0 entered promiscuous mode [ 235.218329][ T9379] device hsr_slave_1 entered promiscuous mode [ 235.258024][ T9379] debugfs: Directory 'hsr0' with parent '/' already present! [ 235.287605][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.295812][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.304059][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.312828][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.322387][ T9376] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 235.370840][ T9376] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 235.445026][ T9369] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.465066][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.473891][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.490337][ T9366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.515511][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.524260][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.532929][ T3048] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.540061][ T3048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.562638][ T9371] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.586023][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.595186][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.604996][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.613766][ T3048] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.620916][ T3048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.629868][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 235.637297][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.671008][ T9379] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 235.730864][ T9379] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 235.794352][ T9379] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 235.844997][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.854416][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.863149][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.872398][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.881688][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.903619][ T9379] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 235.966189][ T9366] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.973871][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.983116][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.991858][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.003408][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.012108][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.020458][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.028530][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.036900][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.052493][ T9371] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.081285][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.129040][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.143761][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.152589][ T9384] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.159790][ T9384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.168297][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.176928][ T9384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.185532][ T9384] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.192671][ T9384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.230125][ T9374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.237208][ T3326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.245951][ T3326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.255264][ T3326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.298160][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 236.335860][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.350201][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.361981][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.369927][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.394327][ T9374] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.415113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.424929][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 236.433088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:13:03 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x0, 0x81, @value=0x3ff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r4, r5, 0x0, 0x1002007ffff007) [ 236.450620][ T9376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.479869][ T9369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.491450][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.515844][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.525657][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.558903][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.567348][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.576617][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.584609][ C0] hrtimer: interrupt took 44063 ns [ 236.599604][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.606704][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.614620][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.623682][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.632795][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.639927][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.648470][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.656630][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.683350][ T9379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.701130][ T9376] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.717676][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.727530][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.741803][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.756819][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.789757][ T9379] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.800661][ T9371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.828147][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.836941][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 17:13:04 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x0, 0x81, @value=0x3ff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r4, r5, 0x0, 0x1002007ffff007) [ 236.891107][ T3048] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.898273][ T3048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.943628][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.961430][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.970002][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.979231][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.987708][ T3048] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.994851][ T3048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.010928][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.046316][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.057602][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.074103][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.094374][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.117249][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.125784][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 17:13:04 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x0, 0x81, @value=0x3ff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000000c0)) pidfd_open(0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r4, r5, 0x0, 0x1002007ffff007) [ 237.142391][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.151734][ T9380] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.158867][ T9380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.178265][ T9396] device nr0 entered promiscuous mode 17:13:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x111180, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000140)='/dev/video1\x00', 0xc) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x8002, &(0x7f0000000000)=0x9, 0x1, 0x2000000000002) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x1, 0x5, [], &(0x7f0000000080)=0xf4}) [ 237.488977][ T9407] mmap: syz-executor.0 (9407) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 237.508807][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.517033][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.535477][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.574729][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.603597][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.610769][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.618868][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.627782][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.635748][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.643741][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.653029][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.661851][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.671386][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.682460][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.696322][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.706442][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.723585][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.734877][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.750805][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 17:13:05 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1ff, 0x8, 0x9, 0x9, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x8}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x0, r1}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x508841, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r4, 0x4161, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r2, @ANYBLOB="0000000000000000950000000000000051823767fffb7c7fd620a95f933c285b463c4ba4935c646d9fde6a7b235ee2b3cf412828259b0f4aca3aaf3f5ec6b44025af2a24645ebb3ff0da44a41b5e399926a17603a96ab55692591e001ee8cfa624d738ba233247aea763d7682ecf01d5d4b520261cccdb65f64679d7cdb61fb46cd6"], &(0x7f0000000140)='GPL\x00', 0x4, 0xe6, &(0x7f0000000040)=""/230, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:13:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x440b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040847bc2fdffe8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01a1f601000080445d8f244f6be479ffffffffff8756ea7d4865881a000000b90f1d7106f5776f7894ee47382b8811e658a49a0eba9b9d6a05995f5ed199fcf8722be75fa42c08322ddd3217bbc0af96fce7f9fce6a1c06643a3ad73f73485bdf28343f885b2b6aba65689a5db166fb3885a0eb167777a9ab9b6"], 0x91) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000001b80)={0x0, 0xfffffffffffffe1e, 0xffffffff, 0x5, 0x0}) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) io_setup(0x7, &(0x7f0000000100)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x1000000400402) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, &(0x7f0000000180)={0x1, 0x3}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000003c0)={0x0, 0x0, 0x7fffffff, 0x1}) io_submit(r2, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r11 = socket(0x10, 0x2, 0x0) sendto(r11, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) recvmmsg(r11, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10440000}, 0xc, &(0x7f0000001680)={0x0}, 0x1, 0x0, 0x0, 0x400}, 0x40008080) r12 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_DISABLE_BEARER(r12, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x7fff, 0x20800) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 238.862242][ T9374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.871257][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.882199][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.968285][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.977516][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.995707][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.007897][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.016653][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.032305][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.043106][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.056210][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.092572][ T9371] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.116401][ T9376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.158749][ T9379] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 239.170397][ T9379] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.194633][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.205987][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.239118][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.259156][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.267718][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.286568][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.294248][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.330063][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.347144][ T9374] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.365601][ T9398] device nr0 entered promiscuous mode [ 239.408290][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.416147][ T3048] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:13:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x440b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040847bc2fdffe8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01a1f601000080445d8f244f6be479ffffffffff8756ea7d4865881a000000b90f1d7106f5776f7894ee47382b8811e658a49a0eba9b9d6a05995f5ed199fcf8722be75fa42c08322ddd3217bbc0af96fce7f9fce6a1c06643a3ad73f73485bdf28343f885b2b6aba65689a5db166fb3885a0eb167777a9ab9b6"], 0x91) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000001b80)={0x0, 0xfffffffffffffe1e, 0xffffffff, 0x5, 0x0}) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) io_setup(0x7, &(0x7f0000000100)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x1000000400402) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, &(0x7f0000000180)={0x1, 0x3}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000003c0)={0x0, 0x0, 0x7fffffff, 0x1}) io_submit(r2, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r11 = socket(0x10, 0x2, 0x0) sendto(r11, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) recvmmsg(r11, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10440000}, 0xc, &(0x7f0000001680)={0x0}, 0x1, 0x0, 0x0, 0x400}, 0x40008080) r12 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_DISABLE_BEARER(r12, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x7fff, 0x20800) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 240.644241][ T9376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.688345][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 240.695884][ T9380] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.725803][ T9379] 8021q: adding VLAN 0 to HW filter on device batadv0 17:13:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001740)=[{0x0}], 0x1}, 0x4040) r2 = gettid() tkill(r2, 0x1000000000016) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040)={0x6, 0xffff, 0x800, 0x3}, 0x8) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 17:13:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) clone(0x20806500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0xb, 0x4, 0x1080000, 0x8, {0x77359400}, {0x1, 0x1, 0x3f, 0x80, 0x0, 0x3f, "a31ad1d2"}, 0x0, 0x1, @offset=0xfffffffb, 0x6, 0x0, r1}) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000240)={0xb, 0x7, {0x52, 0x3, 0x4, {0x80, 0x200}, {0x37a4}, @const={0x8001, {0xfff, 0xc64, 0x5, 0x6}}}, {0x54, 0x1ab, 0x988a, {0x1ff, 0x7fff}, {0x2, 0x1}, @period={0x5c, 0x4, 0x8, 0xfffc, 0x3f, {0x6, 0x40, 0xe04, 0x401}, 0x2, &(0x7f0000000200)=[0x80, 0x5]}}}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:13:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0xc4) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x13b040, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000000c0), 0x4) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = socket$packet(0x11, 0x3, 0x300) r8 = dup(r7) setsockopt$packet_int(r8, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r9 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r9}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x5452, &(0x7f0000000040)) fcntl$getownex(r11, 0x10, &(0x7f0000000580)={0x0, 0x0}) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r14, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r13, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESHEX=r6, @ANYRESDEC=r14], 0x8, 0x1) r15 = socket(0xa, 0x3, 0x8) r16 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r15, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r16, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r15, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)}, 0x0) r18 = gettid() waitid(0x83b895581628fca4, r18, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r15, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r17, @ANYRESDEC=r18]], 0xfffffffffffffe56}}, 0x20004850) r19 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r20 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) r21 = dup2(r20, r19) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r21, 0xc08c5332, &(0x7f0000000140)={0x0, 0x1, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r22 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r22) r23 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r23, 0x227d, &(0x7f0000000780)) kcmp(r22, r18, 0x0, 0xffffffffffffffff, r23) ptrace$setopts(0x4206, r22, 0x0, 0x40) r24 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffe6, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0xb, 0x0, 0xffff}, &(0x7f00000005c0)=0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r22, r24, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r18, r21, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r12, r13, 0x0, 0x1, &(0x7f0000000080)='\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r10, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r9, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r26, r8, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r6, r5, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r25}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r25}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r25}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)={r25}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000040)='\x00', r25}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r25}, 0xc) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x9, r3, &(0x7f0000000080)="1e81b834c44bad600bc863f33d8e338768579a417afed0a24a12a320776bc4b3e10eaf5c72c29601f11e8903fc799fd4b2cd8d88c120f148a6a2ac5759563f5cc4c23876ce875d6e74d9f1266aeac9b4c9b74b9a96767c5b3127645021acb68914839d715e38befe43c51adb62bfbd5d8ad72b944ae73f35b4401446d2c4bfd55d1da80bd1a83927c7c9a990c01cf8afda22b39fead46b24b215284ace01710dcae377a7cc55004356edbe2ac8632073d0eb451a7535e47b0805660a29f1ce21d5e811a3dc2b7320b9a439a715312a0f6861be076ab5681bdaa101b6e5fcc917ae6409e364cb4a297c10db8d428dfb6c293fa672391e09", 0xf7, 0x4, 0x0, 0x2}, &(0x7f0000000240)) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x200c00) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e21, 0xa3, @loopback}], 0xffffffffffffff36) [ 241.404955][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 241.411698][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 241.645835][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 241.652467][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 241.700588][ T9464] bridge0: port 3(gretap0) entered blocking state [ 241.766116][ T9464] bridge0: port 3(gretap0) entered disabled state [ 241.804514][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 241.811227][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 242.094422][ T9464] device gretap0 entered promiscuous mode [ 242.118571][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 242.124932][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 242.131179][ T9464] bridge0: port 3(gretap0) entered blocking state [ 242.138208][ T9464] bridge0: port 3(gretap0) entered forwarding state 17:13:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x41}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000340)={r2, 0x81}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x5}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x2, 0xfffffffd, 0x7ff}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$key(r3, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e667263a7192ff58ab16f88b9663da5668b145e6313f3ee41e2f28204de687a25340b61976cae3a9a9e90785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e5435e7a3bfcb79eda4bf258d5e649caab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000000000000781f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adffffff7f0000"], 0x10}}, 0x0) 17:13:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xbf5dc2aa78ef897a}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2000080001, 0x84) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, 0x0) write$sndseq(r0, &(0x7f0000000280), 0x0) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x44000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000240), r3, 0x0, 0x2, 0x4}}, 0x20) pipe(0x0) close(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_int(r4, 0x29, 0x0, 0x0, &(0x7f0000000040)) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x1, @loopback, 0x8}, 0x32) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000080)={r6, 0x0, 0xfffffffd, 0x0, 0x0, 0x4, 0x0, 0x0, {r6, @in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000140)=0xfffffffffffffdb1) close(0xffffffffffffffff) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x5, 0x4280) set_mempolicy(0x8000, 0x0, 0x4) connect$inet6(r7, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f00000001c0)={'veth0_to_bond\x00', 0x4}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000245654deca6febc5bf6a0d25d480385e98f9fbbbc721b823d02000002810e4e470b07727c126fc3aeda6c951f49b1afa2a7d228003b050319c7ed97f57c79931be993591dfbfed5c48f5cbd297c04d9bfc40220a471303b2e8230103feafda9c782cc264686f349e91ceb389726588fd84450e48100000000000000869c0d251edd7e512f482ef158b9888d8ce3041d9a1d2ea3f48876fe4db69cbeb45bd36f2222e215dcbc7e9c4df7380bb076bb49b78118dfb4e259", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000080)={0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000002c0), 0x4) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x2) read(r8, 0x0, 0x600) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f00000000c0)) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) 17:13:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) clone(0x20806500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0xb, 0x4, 0x1080000, 0x8, {0x77359400}, {0x1, 0x1, 0x3f, 0x80, 0x0, 0x3f, "a31ad1d2"}, 0x0, 0x1, @offset=0xfffffffb, 0x6, 0x0, r1}) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000240)={0xb, 0x7, {0x52, 0x3, 0x4, {0x80, 0x200}, {0x37a4}, @const={0x8001, {0xfff, 0xc64, 0x5, 0x6}}}, {0x54, 0x1ab, 0x988a, {0x1ff, 0x7fff}, {0x2, 0x1}, @period={0x5c, 0x4, 0x8, 0xfffc, 0x3f, {0x6, 0x40, 0xe04, 0x401}, 0x2, &(0x7f0000000200)=[0x80, 0x5]}}}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) dup3(0xffffffffffffffff, r0, 0x0) 17:13:09 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f00000001c0)={0x5, @sdr={0x0, 0xffffffff}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000180)={&(0x7f0000000000), &(0x7f0000000040)=""/88, 0x58}) [ 242.375515][ T9485] IPVS: ftp: loaded support on port[0] = 21 [ 242.496469][ T9491] serio: Serial port ptm0 17:13:09 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) recvfrom$netrom(r0, &(0x7f00000000c0)=""/195, 0xc3, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) recvmsg$can_j1939(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000200)=""/160, 0xa0}], 0x1}, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) accept4$rose(r4, &(0x7f0000000040)=@full={0xb, @remote, @remote, 0x0, [@netrom, @rose, @netrom, @rose, @rose, @rose]}, &(0x7f0000000080)=0x40, 0x100800) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x1}], 0x1}}], 0x92, 0x0) [ 242.611289][ T9498] serio: Serial port ptm0 17:13:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xbf5dc2aa78ef897a}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2000080001, 0x84) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, 0x0) write$sndseq(r0, &(0x7f0000000280), 0x0) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x44000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000240), r3, 0x0, 0x2, 0x4}}, 0x20) pipe(0x0) close(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_int(r4, 0x29, 0x0, 0x0, &(0x7f0000000040)) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x1, @loopback, 0x8}, 0x32) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000080)={r6, 0x0, 0xfffffffd, 0x0, 0x0, 0x4, 0x0, 0x0, {r6, @in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000140)=0xfffffffffffffdb1) close(0xffffffffffffffff) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x5, 0x4280) set_mempolicy(0x8000, 0x0, 0x4) connect$inet6(r7, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f00000001c0)={'veth0_to_bond\x00', 0x4}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000245654deca6febc5bf6a0d25d480385e98f9fbbbc721b823d02000002810e4e470b07727c126fc3aeda6c951f49b1afa2a7d228003b050319c7ed97f57c79931be993591dfbfed5c48f5cbd297c04d9bfc40220a471303b2e8230103feafda9c782cc264686f349e91ceb389726588fd84450e48100000000000000869c0d251edd7e512f482ef158b9888d8ce3041d9a1d2ea3f48876fe4db69cbeb45bd36f2222e215dcbc7e9c4df7380bb076bb49b78118dfb4e259", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000080)={0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local}}}}, &(0x7f0000000140)=0xb0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000002c0), 0x4) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x2) read(r8, 0x0, 0x600) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x84, 0x1e, 0x0, &(0x7f00000000c0)) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) [ 242.906947][ T9516] serio: Serial port ptm0 17:13:10 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x104000, 0x0) pipe(&(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f00000001c0)='\xffuou\xc4e\t') ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000140)={0x0, 0x0, 0x7}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019001400e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x3ff}], 0x4801, 0x0) 17:13:10 executing program 3: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) recvfrom$netrom(r0, &(0x7f00000000c0)=""/195, 0xc3, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) recvmsg$can_j1939(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000200)=""/160, 0xa0}], 0x1}, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) accept4$rose(r4, &(0x7f0000000040)=@full={0xb, @remote, @remote, 0x0, [@netrom, @rose, @netrom, @rose, @rose, @rose]}, &(0x7f0000000080)=0x40, 0x100800) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x1}], 0x1}}], 0x92, 0x0) 17:13:10 executing program 2: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d200100026000080", 0x14}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000000)={0x8000, 0x3, 0x7, 0x200}) [ 243.346293][ T9573] EXT4-fs (loop5): unable to read superblock [ 243.640135][ T9573] EXT4-fs (loop5): unable to read superblock [ 243.678472][ T9492] IPVS: ftp: loaded support on port[0] = 21 [ 243.878515][ T197] tipc: TX() has been purged, node left! 17:13:11 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000040)=0x68) sendfile(r1, r1, 0x0, 0x8800004) 17:13:11 executing program 2: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d200100026000080", 0x14}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000000)={0x8000, 0x3, 0x7, 0x200}) 17:13:11 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6, 0x80000) r1 = socket$packet(0x11, 0x6, 0x300) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x8004, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e583d586d1e5ae95456e8e1b46a7d8b0ce5174a377b97ce7be74326cf98ff080149c21b1dcd028bb690ada8b8aea45bcc05325d25ca2210589bc0a23eebef98205daa08165b4139e71906ea9ce19685bc6c1d9688627ae607908edb28fecdcc9e821946", @ANYRESHEX=r1, @ANYBLOB=',fscache,loose,noextend,access=', @ANYRESDEC=r2, @ANYBLOB=',access=any,\x00']) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) recvfrom$llc(r3, &(0x7f0000000140)=""/68, 0x44, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x1ff) syz_read_part_table(0x6c00, 0x0, 0x0) 17:13:11 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f00000001c0)={0x5, @sdr={0x0, 0xffffffff}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000180)={&(0x7f0000000000), &(0x7f0000000040)=""/88, 0x58}) 17:13:11 executing program 3: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x140) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1fe, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x35b2, 0xe0b7}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) fallocate(r0, 0x4000000000000010, 0x9, 0x7fff) 17:13:11 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff14e) prctl$PR_SET_ENDIAN(0x1e, 0x0) [ 244.290144][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 244.290159][ T26] audit: type=1804 audit(1577034791.615:31): pid=9630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir622321103/syzkaller.Yo2AZL/2/file0" dev="sda1" ino=16551 res=1 [ 244.311793][ T9631] IPVS: ftp: loaded support on port[0] = 21 17:13:11 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 244.484730][ T26] audit: type=1804 audit(1577034791.755:32): pid=9638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir622321103/syzkaller.Yo2AZL/2/file0" dev="sda1" ino=16551 res=1 17:13:11 executing program 3: syz_emit_ethernet(0x1d, &(0x7f0000000ac0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0008060001080006040000aaaa2c3f2f74e0000001aaaaaaaaaabb00000000"], 0x0) [ 244.588298][ T26] audit: type=1800 audit(1577034791.915:33): pid=9630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16551 res=0 17:13:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 244.661737][ T26] audit: type=1800 audit(1577034791.915:34): pid=9638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16551 res=0 17:13:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x1000040, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:13:12 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:12 executing program 3: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) recvmsg$kcm(r4, &(0x7f0000016f40)={&(0x7f0000015dc0)=@xdp, 0x80, &(0x7f0000016ec0)=[{&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000015ec0)=""/4096, 0x1000}], 0x2}, 0x142) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x10001, 0x20}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5411, &(0x7f0000000680)='&@[\x00') r6 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0x2, 0x7, 0xa6, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffbff, 0x0, @perf_config_ext={0x1000000, 0x1ff}, 0x0, 0x6, 0x3, 0x1, 0x5, 0x81}, r0, 0x8, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000400)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="f57f000000000000"], 0xda00) r8 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x70, 0x4, 0x2, 0xc5, 0x5, 0x0, 0x1, 0x4f, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000080)}, 0x1000, 0x6, 0x3b, 0x8, 0x0, 0x3f, 0x6}, r1, 0x10, r6, 0x2) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x2, 0x2, 0x5, 0x9, 0x0, 0xff, 0x841c6, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x6, 0x8000}, 0x12000, 0x10000, 0x8, 0x4, 0x40, 0x1}, r0, 0xe, r8, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) [ 244.845952][ T9660] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:13:12 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x490}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x2, 0x80) write$P9_RCLUNK(r2, &(0x7f0000000000)={0x7}, 0x7) fallocate(r2, 0x0, 0x0, 0x2000402) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x4, r2, 0x83, 0x8, 0x800}) write$P9_RLERROR(r2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8084, &(0x7f0000000100), 0x10) 17:13:12 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 245.255292][ T26] audit: type=1804 audit(1577034792.575:35): pid=9676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir957159374/syzkaller.ac9EqB/6/memory.events" dev="sda1" ino=16537 res=1 [ 245.717157][ T26] audit: type=1804 audit(1577034793.035:36): pid=9687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir957159374/syzkaller.ac9EqB/6/memory.events" dev="sda1" ino=16537 res=1 [ 245.723355][ T9676] syz-executor.3 (9676) used greatest stack depth: 22248 bytes left 17:13:13 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f00000001c0)={0x5, @sdr={0x0, 0xffffffff}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000180)={&(0x7f0000000000), &(0x7f0000000040)=""/88, 0x58}) 17:13:13 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:13 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fb0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000380)={0x8}, 0x0) 17:13:13 executing program 3: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) recvmsg$kcm(r4, &(0x7f0000016f40)={&(0x7f0000015dc0)=@xdp, 0x80, &(0x7f0000016ec0)=[{&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000015ec0)=""/4096, 0x1000}], 0x2}, 0x142) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x10001, 0x20}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5411, &(0x7f0000000680)='&@[\x00') r6 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0x2, 0x7, 0xa6, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffbff, 0x0, @perf_config_ext={0x1000000, 0x1ff}, 0x0, 0x6, 0x3, 0x1, 0x5, 0x81}, r0, 0x8, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000400)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="f57f000000000000"], 0xda00) r8 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x70, 0x4, 0x2, 0xc5, 0x5, 0x0, 0x1, 0x4f, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000080)}, 0x1000, 0x6, 0x3b, 0x8, 0x0, 0x3f, 0x6}, r1, 0x10, r6, 0x2) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x2, 0x2, 0x5, 0x9, 0x0, 0xff, 0x841c6, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x6, 0x8000}, 0x12000, 0x10000, 0x8, 0x4, 0x40, 0x1}, r0, 0xe, r8, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) 17:13:13 executing program 2: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) recvmsg$kcm(r4, &(0x7f0000016f40)={&(0x7f0000015dc0)=@xdp, 0x80, &(0x7f0000016ec0)=[{&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000015ec0)=""/4096, 0x1000}], 0x2}, 0x142) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x10001, 0x20}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5411, &(0x7f0000000680)='&@[\x00') r6 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0x2, 0x7, 0xa6, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffbff, 0x0, @perf_config_ext={0x1000000, 0x1ff}, 0x0, 0x6, 0x3, 0x1, 0x5, 0x81}, r0, 0x8, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000400)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="f57f000000000000"], 0xda00) r8 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x70, 0x4, 0x2, 0xc5, 0x5, 0x0, 0x1, 0x4f, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000080)}, 0x1000, 0x6, 0x3b, 0x8, 0x0, 0x3f, 0x6}, r1, 0x10, r6, 0x2) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x2, 0x2, 0x5, 0x9, 0x0, 0xff, 0x841c6, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x6, 0x8000}, 0x12000, 0x10000, 0x8, 0x4, 0x40, 0x1}, r0, 0xe, r8, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) [ 245.932668][ T9709] IPVS: ftp: loaded support on port[0] = 21 [ 246.103837][ T26] audit: type=1804 audit(1577034793.425:37): pid=9708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir957159374/syzkaller.ac9EqB/7/memory.events" dev="sda1" ino=16561 res=1 [ 246.285820][ T26] audit: type=1804 audit(1577034793.605:38): pid=9714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir098783505/syzkaller.rVd99c/9/memory.events" dev="sda1" ino=16549 res=1 17:13:15 executing program 3: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) recvmsg$kcm(r4, &(0x7f0000016f40)={&(0x7f0000015dc0)=@xdp, 0x80, &(0x7f0000016ec0)=[{&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000015ec0)=""/4096, 0x1000}], 0x2}, 0x142) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x10001, 0x20}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5411, &(0x7f0000000680)='&@[\x00') r6 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0x2, 0x7, 0xa6, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffbff, 0x0, @perf_config_ext={0x1000000, 0x1ff}, 0x0, 0x6, 0x3, 0x1, 0x5, 0x81}, r0, 0x8, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000400)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="f57f000000000000"], 0xda00) r8 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x70, 0x4, 0x2, 0xc5, 0x5, 0x0, 0x1, 0x4f, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000080)}, 0x1000, 0x6, 0x3b, 0x8, 0x0, 0x3f, 0x6}, r1, 0x10, r6, 0x2) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x2, 0x2, 0x5, 0x9, 0x0, 0xff, 0x841c6, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x6, 0x8000}, 0x12000, 0x10000, 0x8, 0x4, 0x40, 0x1}, r0, 0xe, r8, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) 17:13:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:15 executing program 2: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) recvmsg$kcm(r4, &(0x7f0000016f40)={&(0x7f0000015dc0)=@xdp, 0x80, &(0x7f0000016ec0)=[{&(0x7f0000000480)=""/92, 0x5c}, {&(0x7f0000015ec0)=""/4096, 0x1000}], 0x2}, 0x142) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x10001, 0x20}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5411, &(0x7f0000000680)='&@[\x00') r6 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x9, 0x2, 0x7, 0xa6, 0x0, 0x4, 0x100, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffbff, 0x0, @perf_config_ext={0x1000000, 0x1ff}, 0x0, 0x6, 0x3, 0x1, 0x5, 0x81}, r0, 0x8, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='memory.events\x00') socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000400)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="f57f000000000000"], 0xda00) r8 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x70, 0x4, 0x2, 0xc5, 0x5, 0x0, 0x1, 0x4f, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000080)}, 0x1000, 0x6, 0x3b, 0x8, 0x0, 0x3f, 0x6}, r1, 0x10, r6, 0x2) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x2, 0x2, 0x5, 0x9, 0x0, 0xff, 0x841c6, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_config_ext={0x6, 0x8000}, 0x12000, 0x10000, 0x8, 0x4, 0x40, 0x1}, r0, 0xe, r8, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) 17:13:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:15 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:15 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f00000001c0)={0x5, @sdr={0x0, 0xffffffff}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000180)={&(0x7f0000000000), &(0x7f0000000040)=""/88, 0x58}) [ 248.041147][ T26] audit: type=1804 audit(1577034795.365:39): pid=9723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir957159374/syzkaller.ac9EqB/8/memory.events" dev="sda1" ino=16566 res=1 [ 248.165058][ T26] audit: type=1804 audit(1577034795.365:40): pid=9724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir098783505/syzkaller.rVd99c/10/memory.events" dev="sda1" ino=16524 res=1 [ 248.171711][ T9738] IPVS: ftp: loaded support on port[0] = 21 [ 248.190857][ T197] tipc: TX() has been purged, node left! 17:13:15 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 248.389239][ T197] tipc: TX() has been purged, node left! [ 248.396776][ T197] tipc: TX() has been purged, node left! 17:13:15 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:15 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:16 executing program 2: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x40020000000c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0xa8e) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) 17:13:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = dup(r0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/61, 0x3d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r5, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/119, 0x77}, {0x0}], 0x2}, 0x2) shutdown(r6, 0x0) shutdown(r3, 0x0) 17:13:16 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:16 executing program 2: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x40020000000c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0xa8e) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) 17:13:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:18 executing program 2: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x40020000000c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0xa8e) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) 17:13:18 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r6, 0xc0d05605, &(0x7f00000001c0)={0x5, @sdr={0x0, 0xffffffff}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 17:13:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, "401000003bcecf07000200"}) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 251.192550][ T9792] IPVS: ftp: loaded support on port[0] = 21 17:13:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:18 executing program 2: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100002e000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) 17:13:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, "401000003bcecf07000200"}) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 251.692351][ T9817] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 251.709413][ T9817] EXT4-fs (loop2): group descriptors corrupted! 17:13:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, "401000003bcecf07000200"}) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:21 executing program 2: 17:13:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, "401000003bcecf07000200"}) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:21 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r5, 0xc0d05605, &(0x7f00000001c0)={0x5, @sdr={0x0, 0xffffffff}}) 17:13:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:21 executing program 2: [ 254.284311][ T9840] IPVS: ftp: loaded support on port[0] = 21 17:13:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, "401000003bcecf07000200"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:21 executing program 2: 17:13:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, "401000003bcecf07000200"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 256.498273][ T197] tipc: TX() has been purged, node left! [ 256.697972][ T197] tipc: TX() has been purged, node left! [ 256.857926][ T197] tipc: TX() has been purged, node left! 17:13:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:24 executing program 2: 17:13:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x0, "401000003bcecf07000200"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:24 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 17:13:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 257.360160][ T9876] IPVS: ftp: loaded support on port[0] = 21 17:13:24 executing program 2: 17:13:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:24 executing program 2: 17:13:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:25 executing program 2: 17:13:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 17:13:27 executing program 2: 17:13:27 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) 17:13:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:27 executing program 2: [ 260.535094][ T9916] IPVS: ftp: loaded support on port[0] = 21 17:13:27 executing program 2: 17:13:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:28 executing program 2: 17:13:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:28 executing program 2: 17:13:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:30 executing program 2: 17:13:30 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) 17:13:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 17:13:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:31 executing program 2: [ 263.658296][ T9951] IPVS: ftp: loaded support on port[0] = 21 17:13:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 17:13:31 executing program 2: 17:13:31 executing program 2: 17:13:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 17:13:31 executing program 2: [ 265.288041][ T197] tipc: TX() has been purged, node left! [ 265.468006][ T197] tipc: TX() has been purged, node left! [ 265.647964][ T197] tipc: TX() has been purged, node left! 17:13:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:34 executing program 2: 17:13:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 17:13:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 17:13:34 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) 17:13:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:34 executing program 2: [ 266.744537][ T9988] IPVS: ftp: loaded support on port[0] = 21 17:13:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:13:34 executing program 2: 17:13:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:13:34 executing program 2: 17:13:34 executing program 2: 17:13:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:13:37 executing program 2: 17:13:37 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) 17:13:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 269.816527][T10019] IPVS: ftp: loaded support on port[0] = 21 17:13:37 executing program 2: 17:13:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 17:13:37 executing program 2: 17:13:37 executing program 2: 17:13:37 executing program 2: 17:13:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 17:13:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:40 executing program 2: 17:13:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 17:13:40 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) socket$inet6_tcp(0xa, 0x1, 0x0) 17:13:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:40 executing program 2: [ 272.954300][T10061] IPVS: ftp: loaded support on port[0] = 21 17:13:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) 17:13:40 executing program 2: 17:13:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) 17:13:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$packet(r0, 0x0, 0x0, 0x20000800, 0x0, 0x0) 17:13:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) [ 273.638044][ T197] tipc: TX() has been purged, node left! [ 273.798188][ T197] tipc: TX() has been purged, node left! 17:13:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:43 executing program 2: 17:13:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:13:43 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) 17:13:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:43 executing program 2: [ 276.024091][T10100] IPVS: ftp: loaded support on port[0] = 21 17:13:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:13:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 17:13:43 executing program 2: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) fcntl$getflags(r0, 0x1) 17:13:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:13:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b000000", 0x1d}], 0x1}, 0x0) 17:13:46 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) msgget(0x0, 0x2) 17:13:46 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000040)) 17:13:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 279.109538][T10139] IPVS: ftp: loaded support on port[0] = 21 17:13:46 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000040)) [ 279.154111][ T197] tipc: TX() has been purged, node left! [ 279.161535][ T197] tipc: TX() has been purged, node left! 17:13:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b000000", 0x1d}], 0x1}, 0x0) 17:13:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:46 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000040)) 17:13:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b000000", 0x1d}], 0x1}, 0x0) 17:13:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d582594835", 0x2b}], 0x1}, 0x0) 17:13:49 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:13:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 282.143664][T10182] IPVS: ftp: loaded support on port[0] = 21 17:13:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d582594835", 0x2b}], 0x1}, 0x0) 17:13:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d582594835", 0x2b}], 0x1}, 0x0) 17:13:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 284.747946][ T197] tipc: TX() has been purged, node left! [ 284.907945][ T197] tipc: TX() has been purged, node left! 17:13:52 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) msgget(0x0, 0x2) 17:13:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a4", 0x32}], 0x1}, 0x0) 17:13:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:52 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 285.224711][T10226] IPVS: ftp: loaded support on port[0] = 21 17:13:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a4", 0x32}], 0x1}, 0x0) [ 285.342971][T10235] IPVS: ftp: loaded support on port[0] = 21 17:13:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a4", 0x32}], 0x1}, 0x0) 17:13:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d", 0x36}], 0x1}, 0x0) 17:13:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d", 0x36}], 0x1}, 0x0) 17:13:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d", 0x36}], 0x1}, 0x0) 17:13:53 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) msgget(0x0, 0x2) 17:13:53 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x80002, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 286.237028][T10262] IPVS: ftp: loaded support on port[0] = 21 [ 286.347279][T10266] IPVS: ftp: loaded support on port[0] = 21 17:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df5", 0x38}], 0x1}, 0x0) 17:13:55 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) msgget(0x0, 0x2) 17:13:55 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:13:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df5", 0x38}], 0x1}, 0x0) 17:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 288.424642][T10290] IPVS: ftp: loaded support on port[0] = 21 17:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 288.480548][T10296] IPVS: ftp: loaded support on port[0] = 21 17:13:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df5", 0x38}], 0x1}, 0x0) 17:13:56 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = msgget(0x0, 0x2) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000002c0)=""/162) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) prctl$PR_SET_ENDIAN(0x14, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) [ 288.874521][T10313] IPVS: ftp: loaded support on port[0] = 21 17:13:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:56 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 289.406746][T10322] IPVS: ftp: loaded support on port[0] = 21 17:13:56 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) shutdown(r1, 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 289.744717][T10328] IPVS: ftp: loaded support on port[0] = 21 17:13:57 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 290.255648][T10333] IPVS: ftp: loaded support on port[0] = 21 17:13:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:13:58 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:13:58 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:13:58 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 291.452007][T10343] IPVS: ftp: loaded support on port[0] = 21 [ 291.529376][T10348] IPVS: ftp: loaded support on port[0] = 21 17:13:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:13:58 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:59 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:59 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:59 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 292.168057][ T197] tipc: TX() has been purged, node left! 17:13:59 executing program 1: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:13:59 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 292.328015][ T197] tipc: TX() has been purged, node left! [ 292.445351][T10383] IPVS: ftp: loaded support on port[0] = 21 [ 292.488426][ T197] tipc: TX() has been purged, node left! [ 292.494652][ T197] tipc: TX() has been purged, node left! [ 292.508937][ T197] tipc: TX() has been purged, node left! [ 292.521666][ T197] tipc: TX() has been purged, node left! [ 292.535415][ T197] tipc: TX() has been purged, node left! [ 292.552004][ T197] tipc: TX() has been purged, node left! [ 292.678005][ T197] tipc: TX() has been purged, node left! [ 292.827961][ T197] tipc: TX() has been purged, node left! 17:14:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:01 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x80002, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:01 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 294.552408][T10392] IPVS: ftp: loaded support on port[0] = 21 [ 294.612894][T10398] IPVS: ftp: loaded support on port[0] = 21 17:14:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:02 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:02 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:02 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:02 executing program 1: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:02 executing program 1: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:04 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:04 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:04 executing program 1: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 297.644659][T10441] IPVS: ftp: loaded support on port[0] = 21 [ 297.654474][T10440] IPVS: ftp: loaded support on port[0] = 21 17:14:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 17:14:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 17:14:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 17:14:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:14:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 17:14:08 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:08 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 300.707255][T10484] IPVS: ftp: loaded support on port[0] = 21 [ 300.777574][T10490] IPVS: ftp: loaded support on port[0] = 21 17:14:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:14:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 17:14:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:14:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 17:14:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 17:14:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:11 executing program 0: unshare(0x40000000) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:11 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 303.904930][T10536] IPVS: ftp: loaded support on port[0] = 21 17:14:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) [ 303.946468][T10533] IPVS: ftp: loaded support on port[0] = 21 17:14:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:11 executing program 0: unshare(0x40000000) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) 17:14:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 304.374917][T10560] IPVS: ftp: loaded support on port[0] = 21 17:14:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[], 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 304.462879][T10567] ptrace attach of "/root/syz-executor.5"[10566] was attempted by "/root/syz-executor.5"[10567] 17:14:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) 17:14:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[], 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:14 executing program 0: unshare(0x40000000) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:14 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) [ 306.924243][T10582] IPVS: ftp: loaded support on port[0] = 21 [ 306.944458][T10581] IPVS: ftp: loaded support on port[0] = 21 17:14:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[], 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) 17:14:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR], 0x8) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 307.244637][T10603] ptrace attach of "/root/syz-executor.5"[10602] was attempted by "/root/syz-executor.5"[10603] 17:14:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:14:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR], 0x8) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:17 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 310.082554][T10632] IPVS: ftp: loaded support on port[0] = 21 17:14:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR], 0x8) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:14:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 17:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b000000", 0x1d}], 0x1}, 0x0) 17:14:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 17:14:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:20 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a5", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 313.226835][T10685] IPVS: ftp: loaded support on port[0] = 21 17:14:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b000000", 0x1d}], 0x1}, 0x0) 17:14:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 17:14:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b000000", 0x1d}], 0x1}, 0x0) 17:14:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d582594835", 0x2b}], 0x1}, 0x0) 17:14:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d582594835", 0x2b}], 0x1}, 0x0) 17:14:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:21 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d582594835", 0x2b}], 0x1}, 0x0) 17:14:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, 0x0) 17:14:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a4", 0x32}], 0x1}, 0x0) [ 314.486721][T10744] IPVS: ftp: loaded support on port[0] = 21 17:14:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a4", 0x32}], 0x1}, 0x0) [ 316.307914][ T197] tipc: TX() has been purged, node left! 17:14:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 316.527937][ T197] tipc: TX() has been purged, node left! 17:14:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a4", 0x32}], 0x1}, 0x0) 17:14:24 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:24 executing program 2: unshare(0x40000000) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 316.707969][ T197] tipc: TX() has been purged, node left! 17:14:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d", 0x36}], 0x1}, 0x0) [ 316.773117][T10777] IPVS: ftp: loaded support on port[0] = 21 [ 316.847989][ T197] tipc: TX() has been purged, node left! [ 316.868321][ T197] tipc: TX() has been purged, node left! [ 316.888886][ T197] tipc: TX() has been purged, node left! [ 316.916101][ T197] tipc: TX() has been purged, node left! [ 316.940497][ T197] tipc: TX() has been purged, node left! [ 316.963167][ T197] tipc: TX() has been purged, node left! 17:14:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d", 0x36}], 0x1}, 0x0) [ 316.986989][ T197] tipc: TX() has been purged, node left! 17:14:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0xffffffff}, 0x1c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r1 = perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x8) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="2321202e2f66696c65307156c4061f9efe75d8cafa3ef32c473f57d496d157235ee89a995c6d5c452bb1b46a7ba07d5c67c58a13043d9d73c43e72fefc0354e392b68083d90010d7465afd387f0000000000000083e1707ecd77b7fb013f68c7298063b059dc38dbd0f387a91c4925f1b78084e0e5685128125656880a6ab637369da44301aa93c72b7fed4aec7bbd45c40ef4f516c359f4cc64282be05d7e0feab5ab18075567fb81526827daee5ca4c39d4792f47018a7412f1e904f7ca9377337a7eafb8ee853ce9d8f2ea7fce3e7ca4707cca84b5440a0e6a0f453ccda709772b0d9a4a480ce2c7f354ca560f1e6f4b09ec63d15799b6d735f0596c5cbd07a06102d6984f23faf229a3cf2dd1dd3d09d27f2092b4f7919f57c630821d8b4e96ba03121f816831d45c568ac2a6bcf94c8c944e1f0c3411137163df2b0e0280b3461f31f9927789ffcdeb8cd534083f8d64e0af2c3d5cafe740f7f37f55d21a9b97bf8178de485225dc6e24aefd98db70c4e2187d969ae69e71b8d4b611db2ac42d012d14f2c6ce1efa791cc2a9a7dbb6d1e862c5043f0714050a0408fcf65badc83a32d825f1505f515dd2600330820dffba62f38755f14"], 0xa) epoll_create1(0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x113000, 0x42) open_by_handle_at(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="b9c300000103f2b6ca77130100010000003501010000000000000000465025c1312e913636dca08cc5606333c40a2063a92c6422568a2fd1529ab214c16f8e3ba4d63ca8414c9a45cd4d466236c725b69440dbad46f6a92c9bbf9b06e86643"], 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x0, 0xba000) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f00000002c0)=""/153) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x8}) r5 = getpid() tkill(r5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x0, 0x30, &(0x7f00000000c0)='{keyring\'cgroup$userprocposix_acl_accessnodev&!\x00', 0x0}, 0x30) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r9 = socket$inet6(0xa, 0x80003, 0x3) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x718000) setsockopt$inet6_int(r9, 0x29, 0x3, &(0x7f0000000080)=0xfffffff7, 0x4) sendto$inet6(r9, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r10 = socket$inet6(0xa, 0x80003, 0x7) recvfrom$inet6(r10, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x718000) setsockopt$inet6_int(r10, 0x29, 0x3, &(0x7f0000000080), 0x4) sendto$inet6(r10, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$P9_RWALK(r4, &(0x7f00000005c0)=ANY=[], 0x45) write$P9_RREADDIR(r8, &(0x7f0000000580)=ANY=[@ANYBLOB="d265008ced322c686b812e9b4495f8d2ad756708356154c713110952e855e2a3d329449590b641b1785ea61b532b44cf2244f444897c0cb39b6a3428097d90ea7467b3cddee1976afd4ac810fd45ed95c99f0e9ea01f6109d695b39eb7d10bcca6ea5a8d1f2a"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r8, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000400)=[@text16={0x10, &(0x7f00000003c0)="2e6667f20f2c65079a4480a300660f50eaea0060dc00df66e726660f7fc4ba610066b876ae000066eff2a5660fd8d0ba4100b000ee", 0x35}], 0x1, 0x10, &(0x7f0000000540)=[@flags={0x3, 0x80000}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='v', r7}, 0x30) 17:14:24 executing program 2: unshare(0x40000000) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d", 0x36}], 0x1}, 0x0) [ 317.158843][ T197] tipc: TX() has been purged, node left! [ 317.281659][T10799] IPVS: ftp: loaded support on port[0] = 21 [ 317.318688][ T197] tipc: TX() has been purged, node left! [ 317.339574][ T197] tipc: TX() has been purged, node left! [ 317.354052][ T197] tipc: TX() has been purged, node left! [ 317.375931][ T197] tipc: TX() has been purged, node left! [ 317.383707][ T197] tipc: TX() has been purged, node left! [ 317.415355][ T197] tipc: TX() has been purged, node left! 17:14:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:26 executing program 2: unshare(0x40000000) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 319.632360][T10812] IPVS: ftp: loaded support on port[0] = 21 17:14:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:27 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2, 0xffffffff}, 0x1c) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r1 = perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x8) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xa) epoll_create1(0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x113000, 0x42) open_by_handle_at(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="b9c300000103f2b6ca77130100010000003501010000000000000000465025c1312e913636dca08cc5606333c40a2063a92c6422568a2fd1529ab214c16f8e3ba4d63ca8414c9a45cd4d466236c725b69440dbad46f6a92c9bbf9b06e86643"], 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x0, 0xba000) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f00000002c0)=""/153) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x8}) r5 = getpid() tkill(r5, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, 0xffffffffffffffff, 0x0, 0x30, &(0x7f00000000c0)='{keyring\'cgroup$userprocposix_acl_accessnodev&!\x00', 0x0}, 0x30) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r9 = socket$inet6(0xa, 0x80003, 0x3) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x718000) setsockopt$inet6_int(r9, 0x29, 0x3, &(0x7f0000000080)=0xfffffff7, 0x4) sendto$inet6(r9, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r10 = socket$inet6(0xa, 0x80003, 0x7) recvfrom$inet6(r10, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x718000) setsockopt$inet6_int(r10, 0x29, 0x3, &(0x7f0000000080), 0x4) sendto$inet6(r10, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$P9_RWALK(r4, &(0x7f00000005c0)=ANY=[], 0x45) write$P9_RREADDIR(r8, &(0x7f0000000580)=ANY=[@ANYBLOB="d265008ced322c686b812e9b4495f8d2ad756708356154c713110952e855e2a3d329449590b641b1785ea61b532b44cf2244f444897c0cb39b6a3428097d90ea7467b3cddee1976afd4ac810fd45ed95c99f0e9ea01f6109d695b39eb7d10bcca6ea5a8d1f2a"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r8, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000400)=[@text16={0x10, &(0x7f00000003c0)="2e6667f20f2c65079a4480a300660f50eaea0060dc00df66e726660f7fc4ba610066b876ae000066eff2a5660fd8d0ba4100b000ee", 0x35}], 0x1, 0x10, &(0x7f0000000540)=[@flags={0x3, 0x80000}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='v', r7}, 0x30) 17:14:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df5", 0x38}], 0x1}, 0x0) 17:14:27 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df5", 0x38}], 0x1}, 0x0) 17:14:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df5", 0x38}], 0x1}, 0x0) 17:14:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 17:14:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x4, 0x9, 0x0, 0x8, 0x0, 0xfdc5, 0x400, 0x329100eace06b4d, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x3560, 0x800}, 0x100d0, 0x96ab, 0x200, 0x6, 0xa, 0xfff, 0x6}, 0x0, 0x8, 0xffffffffffffffff, 0x3ec473cbacb1f73e) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nr0\x00', 0x1000}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81\n?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 17:14:27 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="140020a231827acc"], 0x48}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 320.428882][T10848] device nr0 entered promiscuous mode 17:14:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:29 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:30 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x4, 0x9, 0x0, 0x8, 0x0, 0xfdc5, 0x400, 0x329100eace06b4d, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x3560, 0x800}, 0x100d0, 0x96ab, 0x200, 0x6, 0xa, 0xfff, 0x6}, 0x0, 0x8, 0xffffffffffffffff, 0x3ec473cbacb1f73e) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nr0\x00', 0x1000}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81\n?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 17:14:30 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32, @ANYBLOB="140020a231827acc"], 0x48}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 17:14:30 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 323.110956][T10875] device nr0 entered promiscuous mode 17:14:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 17:14:30 executing program 2: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 17:14:33 executing program 3: unshare(0x6c060000) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00b\x00\xe4\xff\xff\xff\xff\xdc\xff\xff\x00', 0xfffffffffffffffd}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 17:14:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 17:14:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:33 executing program 2: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:33 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 325.797498][T10919] IPVS: ftp: loaded support on port[0] = 21 [ 325.797575][T10920] IPVS: ftp: loaded support on port[0] = 21 [ 325.874760][T10923] device lo entered promiscuous mode 17:14:33 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 325.899027][T10928] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:14:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 326.086178][T10932] IPVS: ftp: loaded support on port[0] = 21 17:14:33 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:33 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:33 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:33 executing program 2: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 326.408068][T10944] IPVS: ftp: loaded support on port[0] = 21 [ 326.454852][T10950] ptrace attach of "/root/syz-executor.4"[10948] was attempted by "/root/syz-executor.4"[10950] [ 326.510513][T10952] IPVS: ftp: loaded support on port[0] = 21 17:14:36 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:36 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:36 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:36 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:36 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 328.797401][T10971] ptrace attach of "/root/syz-executor.4"[10970] was attempted by "/root/syz-executor.4"[10971] [ 328.810939][T10974] IPVS: ftp: loaded support on port[0] = 21 [ 328.820355][T10976] IPVS: ftp: loaded support on port[0] = 21 [ 328.821274][T10972] IPVS: ftp: loaded support on port[0] = 21 17:14:36 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 328.865699][T10973] IPVS: ftp: loaded support on port[0] = 21 17:14:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 328.964696][T10988] ptrace attach of "/root/syz-executor.4"[10987] was attempted by "/root/syz-executor.4"[10988] 17:14:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:36 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:36 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 329.394313][T11004] IPVS: ftp: loaded support on port[0] = 21 [ 329.394804][T11002] IPVS: ftp: loaded support on port[0] = 21 17:14:36 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:37 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 329.817357][T11019] IPVS: ftp: loaded support on port[0] = 21 [ 329.824732][T11020] IPVS: ftp: loaded support on port[0] = 21 17:14:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:39 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6, 0x80000) r1 = socket$packet(0x11, 0x6, 0x300) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x8004, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e583d586d1e5ae95456e8e1b46a7d8b0ce5174a377b97ce7be74326cf98ff080149c21b1dcd028bb690ada8b8aea45bcc05325d25ca2210589bc0a23eebef98205daa08165b4139e71906ea9ce19685bc6c1d9688627ae607908edb28fecdcc9e821946", @ANYRESHEX=r1, @ANYBLOB=',fscache,loose,noextend,access=', @ANYRESDEC=r2, @ANYBLOB=',access=any,\x00']) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x1, &(0x7f00000000c0)=[@assoc]}], 0x492492492492773, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) recvfrom$llc(r3, &(0x7f0000000140)=""/68, 0x44, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x1ff) syz_read_part_table(0x6c00, 0x0, 0x0) 17:14:39 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:39 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:39 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 331.933150][T11030] IPVS: ftp: loaded support on port[0] = 21 [ 331.951913][T11036] IPVS: ftp: loaded support on port[0] = 21 [ 331.972114][T11039] IPVS: ftp: loaded support on port[0] = 21 17:14:39 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4a522", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:39 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 332.263966][T11054] IPVS: ftp: loaded support on port[0] = 21 17:14:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:39 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 332.378759][T11062] IPVS: ftp: loaded support on port[0] = 21 [ 332.466526][T11070] IPVS: ftp: loaded support on port[0] = 21 17:14:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:42 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:42 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:42 executing program 3 (fault-call:4 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:42 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 334.998952][T11083] IPVS: ftp: loaded support on port[0] = 21 [ 335.007100][T11085] IPVS: ftp: loaded support on port[0] = 21 [ 335.010263][T11082] FAULT_INJECTION: forcing a failure. [ 335.010263][T11082] name failslab, interval 1, probability 0, space 0, times 1 [ 335.041953][T11090] FAULT_INJECTION: forcing a failure. [ 335.041953][T11090] name failslab, interval 1, probability 0, space 0, times 1 [ 335.069043][T11090] CPU: 0 PID: 11090 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 335.078984][T11090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.089129][T11090] Call Trace: [ 335.092499][T11090] dump_stack+0x197/0x210 [ 335.096892][T11090] should_fail.cold+0xa/0x10 [ 335.101488][T11090] ? setup_fault_attr+0x220/0x220 [ 335.106574][T11090] ? ___might_sleep+0x163/0x2c0 [ 335.111528][T11090] __should_failslab+0x121/0x190 [ 335.116543][T11090] should_failslab+0x9/0x14 [ 335.121066][T11090] __kmalloc+0x2e0/0x770 [ 335.125466][T11090] ? mark_held_locks+0xf0/0xf0 [ 335.130238][T11090] ? mark_lock+0xc2/0x1220 [ 335.134712][T11090] ? _parse_integer+0x190/0x190 [ 335.139603][T11090] ? tomoyo_realpath_from_path+0xc5/0x660 [ 335.145324][T11090] tomoyo_realpath_from_path+0xc5/0x660 [ 335.150907][T11090] ? tomoyo_path_number_perm+0x193/0x520 [ 335.156557][T11090] tomoyo_path_number_perm+0x1dd/0x520 [ 335.162024][T11090] ? tomoyo_path_number_perm+0x193/0x520 [ 335.167666][T11090] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 335.173535][T11090] ? __f_unlock_pos+0x19/0x20 [ 335.178230][T11090] ? __fget+0x37f/0x550 [ 335.182381][T11090] ? do_dup2+0x4f0/0x4f0 [ 335.186677][T11090] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 335.192965][T11090] ? fput_many+0x12c/0x1a0 [ 335.197382][T11090] tomoyo_file_ioctl+0x23/0x30 [ 335.202200][T11090] security_file_ioctl+0x77/0xc0 [ 335.207154][T11090] ksys_ioctl+0x56/0x180 [ 335.211406][T11090] __x64_sys_ioctl+0x73/0xb0 [ 335.216052][T11090] do_syscall_64+0xfa/0x790 [ 335.220592][T11090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.226566][T11090] RIP: 0033:0x45a919 [ 335.230451][T11090] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.250054][T11090] RSP: 002b:00007f1bba6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 335.258464][T11090] RAX: ffffffffffffffda RBX: 00007f1bba6c7c90 RCX: 000000000045a919 [ 335.266425][T11090] RDX: 0000000020000040 RSI: 0000000000005412 RDI: 0000000000000004 [ 335.274384][T11090] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 335.282350][T11090] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bba6c86d4 [ 335.290321][T11090] R13: 00000000004c5a54 R14: 00000000004dbd50 R15: 0000000000000005 [ 335.298323][T11082] CPU: 1 PID: 11082 Comm: syz-executor.1 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 335.308219][T11082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.308226][T11082] Call Trace: [ 335.308247][T11082] dump_stack+0x197/0x210 [ 335.308271][T11082] should_fail.cold+0xa/0x10 [ 335.308350][T11082] ? release_sock+0x156/0x1c0 [ 335.308370][T11082] ? setup_fault_attr+0x220/0x220 [ 335.340279][T11082] ? ___might_sleep+0x163/0x2c0 [ 335.340304][T11082] __should_failslab+0x121/0x190 [ 335.340322][T11082] should_failslab+0x9/0x14 [ 335.340340][T11082] kmem_cache_alloc_node+0x268/0x740 [ 335.354635][T11082] __alloc_skb+0xd5/0x5e0 [ 335.354659][T11082] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 335.354678][T11082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.354771][T11082] ? netlink_autobind.isra.0+0x223/0x300 [ 335.369844][T11082] netlink_sendmsg+0xa1b/0xea0 [ 335.369870][T11082] ? netlink_unicast+0x7d0/0x7d0 [ 335.369950][T11082] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 335.369971][T11082] ? apparmor_socket_sendmsg+0x2a/0x30 [ 335.381846][T11082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.397045][T11082] ? security_socket_sendmsg+0x8d/0xc0 [ 335.397063][T11082] ? netlink_unicast+0x7d0/0x7d0 [ 335.397078][T11082] sock_sendmsg+0xd7/0x130 [ 335.397096][T11082] ____sys_sendmsg+0x753/0x880 [ 335.419141][T11082] ? kernel_sendmsg+0x50/0x50 [ 335.419159][T11082] ? __fget+0x35d/0x550 [ 335.419175][T11082] ? find_held_lock+0x35/0x130 [ 335.419198][T11082] ___sys_sendmsg+0x100/0x170 [ 335.419216][T11082] ? sendmsg_copy_msghdr+0x70/0x70 [ 335.419232][T11082] ? __kasan_check_read+0x11/0x20 [ 335.419249][T11082] ? __fget+0x37f/0x550 [ 335.419269][T11082] ? do_dup2+0x4f0/0x4f0 [ 335.428435][T11082] ? __fget_light+0x1a9/0x230 [ 335.428453][T11082] ? __fdget+0x1b/0x20 [ 335.428471][T11082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 335.428493][T11082] __sys_sendmsg+0x105/0x1d0 [ 335.428509][T11082] ? __sys_sendmsg_sock+0xc0/0xc0 [ 335.428539][T11082] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 335.437342][T11082] ? do_syscall_64+0x26/0x790 [ 335.437360][T11082] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.437374][T11082] ? do_syscall_64+0x26/0x790 [ 335.437395][T11082] __x64_sys_sendmsg+0x78/0xb0 [ 335.451917][T11082] do_syscall_64+0xfa/0x790 [ 335.465311][T11082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.465325][T11082] RIP: 0033:0x45a919 [ 335.465340][T11082] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:14:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 335.465353][T11082] RSP: 002b:00007f61c3ecdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 335.480306][T11082] RAX: ffffffffffffffda RBX: 00007f61c3ecdc90 RCX: 000000000045a919 [ 335.480316][T11082] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 335.480325][T11082] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 335.480335][T11082] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61c3ece6d4 [ 335.480344][T11082] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 17:14:42 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 335.593479][T11090] ERROR: Out of memory at tomoyo_realpath_from_path. 17:14:43 executing program 3 (fault-call:4 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 335.785046][T11102] FAULT_INJECTION: forcing a failure. [ 335.785046][T11102] name failslab, interval 1, probability 0, space 0, times 0 [ 335.822534][T11102] CPU: 1 PID: 11102 Comm: syz-executor.1 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 335.832480][T11102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.842547][T11102] Call Trace: [ 335.842840][T11104] FAULT_INJECTION: forcing a failure. [ 335.842840][T11104] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 335.845847][T11102] dump_stack+0x197/0x210 [ 335.863366][T11102] should_fail.cold+0xa/0x10 [ 335.867974][T11102] ? setup_fault_attr+0x220/0x220 [ 335.873000][T11102] ? ___might_sleep+0x163/0x2c0 [ 335.877859][T11102] __should_failslab+0x121/0x190 [ 335.882788][T11102] should_failslab+0x9/0x14 [ 335.887279][T11102] kmem_cache_alloc_node_trace+0x274/0x750 [ 335.893163][T11102] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 335.899135][T11102] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 335.904945][T11102] __kmalloc_node_track_caller+0x3d/0x70 [ 335.910571][T11102] __kmalloc_reserve.isra.0+0x40/0xf0 [ 335.915934][T11102] __alloc_skb+0x10b/0x5e0 [ 335.920341][T11102] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 335.925879][T11102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.932108][T11102] ? netlink_autobind.isra.0+0x223/0x300 [ 335.937732][T11102] netlink_sendmsg+0xa1b/0xea0 [ 335.942486][T11102] ? netlink_unicast+0x7d0/0x7d0 [ 335.947409][T11102] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 335.952957][T11102] ? apparmor_socket_sendmsg+0x2a/0x30 [ 335.958489][T11102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.964747][T11102] ? security_socket_sendmsg+0x8d/0xc0 [ 335.970206][T11102] ? netlink_unicast+0x7d0/0x7d0 [ 335.975139][T11102] sock_sendmsg+0xd7/0x130 [ 335.979545][T11102] ____sys_sendmsg+0x753/0x880 [ 335.984299][T11102] ? kernel_sendmsg+0x50/0x50 [ 335.988965][T11102] ? __fget+0x35d/0x550 [ 335.993116][T11102] ? find_held_lock+0x35/0x130 [ 335.997874][T11102] ___sys_sendmsg+0x100/0x170 [ 336.002548][T11102] ? sendmsg_copy_msghdr+0x70/0x70 [ 336.007649][T11102] ? __kasan_check_read+0x11/0x20 [ 336.012666][T11102] ? __fget+0x37f/0x550 [ 336.016815][T11102] ? do_dup2+0x4f0/0x4f0 [ 336.021053][T11102] ? __fget_light+0x1a9/0x230 [ 336.025979][T11102] ? __fdget+0x1b/0x20 [ 336.030038][T11102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.036267][T11102] __sys_sendmsg+0x105/0x1d0 [ 336.040857][T11102] ? __sys_sendmsg_sock+0xc0/0xc0 [ 336.045882][T11102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.051353][T11102] ? do_syscall_64+0x26/0x790 [ 336.056053][T11102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.062141][T11102] ? do_syscall_64+0x26/0x790 [ 336.066835][T11102] __x64_sys_sendmsg+0x78/0xb0 [ 336.071597][T11102] do_syscall_64+0xfa/0x790 [ 336.076108][T11102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.081985][T11102] RIP: 0033:0x45a919 [ 336.085868][T11102] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.105455][T11102] RSP: 002b:00007f61c3ecdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 336.113942][T11102] RAX: ffffffffffffffda RBX: 00007f61c3ecdc90 RCX: 000000000045a919 [ 336.121912][T11102] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 17:14:43 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 336.129869][T11102] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 336.137829][T11102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61c3ece6d4 [ 336.145797][T11102] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 [ 336.153781][T11104] CPU: 0 PID: 11104 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 336.163686][T11104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.173754][T11104] Call Trace: [ 336.177048][T11104] dump_stack+0x197/0x210 [ 336.181410][T11104] should_fail.cold+0xa/0x10 17:14:43 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 336.186012][T11104] ? setup_fault_attr+0x220/0x220 [ 336.191055][T11104] ? __kasan_check_read+0x11/0x20 [ 336.196085][T11104] ? mark_lock+0xc2/0x1220 [ 336.200613][T11104] ? __kernel_text_address+0xd/0x40 [ 336.205904][T11104] should_fail_alloc_page+0x50/0x60 [ 336.211108][T11104] __alloc_pages_nodemask+0x1a1/0x910 [ 336.216496][T11104] ? __alloc_pages_slowpath+0x2900/0x2900 [ 336.222226][T11104] ? __kasan_check_read+0x11/0x20 [ 336.227272][T11104] ? setup_fault_attr+0x220/0x220 [ 336.232313][T11104] cache_grow_begin+0x90/0xc60 [ 336.232333][T11104] ? tomoyo_realpath_from_path+0xc5/0x660 [ 336.242866][T11104] ? trace_hardirqs_off+0x62/0x240 [ 336.242886][T11104] __kmalloc+0x6b2/0x770 [ 336.252229][T11104] ? mark_held_locks+0xf0/0xf0 [ 336.257001][T11104] ? mark_lock+0xc2/0x1220 [ 336.261423][T11104] ? tomoyo_realpath_from_path+0xc5/0x660 [ 336.267155][T11104] tomoyo_realpath_from_path+0xc5/0x660 [ 336.272717][T11104] ? tomoyo_path_number_perm+0x193/0x520 [ 336.275661][T11107] FAULT_INJECTION: forcing a failure. [ 336.275661][T11107] name failslab, interval 1, probability 0, space 0, times 0 [ 336.278376][T11104] tomoyo_path_number_perm+0x1dd/0x520 [ 336.278393][T11104] ? tomoyo_path_number_perm+0x193/0x520 [ 336.278414][T11104] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 336.278428][T11104] ? __f_unlock_pos+0x19/0x20 [ 336.278475][T11104] ? __fget+0x37f/0x550 [ 336.316845][T11104] ? do_dup2+0x4f0/0x4f0 [ 336.321102][T11104] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 336.327346][T11104] ? fput_many+0x12c/0x1a0 [ 336.331758][T11104] tomoyo_file_ioctl+0x23/0x30 [ 336.336522][T11104] security_file_ioctl+0x77/0xc0 [ 336.341459][T11104] ksys_ioctl+0x56/0x180 [ 336.345696][T11104] __x64_sys_ioctl+0x73/0xb0 [ 336.350285][T11104] do_syscall_64+0xfa/0x790 [ 336.355413][T11104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.361315][T11104] RIP: 0033:0x45a919 [ 336.365210][T11104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.384817][T11104] RSP: 002b:00007f1bba6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.393216][T11104] RAX: ffffffffffffffda RBX: 00007f1bba6c7c90 RCX: 000000000045a919 [ 336.401176][T11104] RDX: 0000000020000040 RSI: 0000000000005412 RDI: 0000000000000004 [ 336.409149][T11104] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 336.417121][T11104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bba6c86d4 [ 336.425099][T11104] R13: 00000000004c5a54 R14: 00000000004dbd50 R15: 0000000000000005 [ 336.433084][T11107] CPU: 1 PID: 11107 Comm: syz-executor.1 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 336.442985][T11107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.454005][T11107] Call Trace: [ 336.457309][T11107] dump_stack+0x197/0x210 [ 336.461658][T11107] should_fail.cold+0xa/0x10 [ 336.466261][T11107] ? setup_fault_attr+0x220/0x220 [ 336.471311][T11107] __should_failslab+0x121/0x190 [ 336.476271][T11107] should_failslab+0x9/0x14 [ 336.483472][T11107] kmem_cache_alloc+0x47/0x710 [ 336.483492][T11107] ? lock_acquire+0x190/0x410 [ 336.483514][T11107] ? netlink_deliver_tap+0x145/0xbe0 [ 336.498235][T11107] skb_clone+0x154/0x3d0 [ 336.498255][T11107] netlink_deliver_tap+0x93c/0xbe0 [ 336.498277][T11107] netlink_unicast+0x643/0x7d0 [ 336.498294][T11107] ? netlink_attachskb+0x870/0x870 [ 336.498316][T11107] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 336.507712][T11107] ? __check_object_size+0x3d/0x437 [ 336.507734][T11107] netlink_sendmsg+0x91c/0xea0 [ 336.533251][T11107] ? netlink_unicast+0x7d0/0x7d0 [ 336.538206][T11107] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 336.541353][T11109] IPVS: ftp: loaded support on port[0] = 21 [ 336.543779][T11107] ? apparmor_socket_sendmsg+0x2a/0x30 [ 336.543799][T11107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.543820][T11107] ? security_socket_sendmsg+0x8d/0xc0 [ 336.566844][T11107] ? netlink_unicast+0x7d0/0x7d0 [ 336.571799][T11107] sock_sendmsg+0xd7/0x130 [ 336.576230][T11107] ____sys_sendmsg+0x753/0x880 [ 336.581029][T11107] ? kernel_sendmsg+0x50/0x50 [ 336.585723][T11107] ? __fget+0x35d/0x550 [ 336.589892][T11107] ? find_held_lock+0x35/0x130 [ 336.594672][T11107] ___sys_sendmsg+0x100/0x170 [ 336.594690][T11107] ? sendmsg_copy_msghdr+0x70/0x70 [ 336.594710][T11107] ? __kasan_check_read+0x11/0x20 [ 336.609498][T11107] ? __fget+0x37f/0x550 [ 336.613663][T11107] ? do_dup2+0x4f0/0x4f0 [ 336.617910][T11107] ? __fget_light+0x1a9/0x230 [ 336.617928][T11107] ? __fdget+0x1b/0x20 [ 336.617945][T11107] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.617964][T11107] __sys_sendmsg+0x105/0x1d0 17:14:43 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) [ 336.617982][T11107] ? __sys_sendmsg_sock+0xc0/0xc0 [ 336.632932][T11107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.632950][T11107] ? do_syscall_64+0x26/0x790 [ 336.632966][T11107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.632981][T11107] ? do_syscall_64+0x26/0x790 [ 336.633002][T11107] __x64_sys_sendmsg+0x78/0xb0 [ 336.633018][T11107] do_syscall_64+0xfa/0x790 [ 336.633034][T11107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.633053][T11107] RIP: 0033:0x45a919 [ 336.633066][T11107] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.633080][T11107] RSP: 002b:00007f61c3ecdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 336.642658][T11107] RAX: ffffffffffffffda RBX: 00007f61c3ecdc90 RCX: 000000000045a919 [ 336.642672][T11107] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 336.674052][T11107] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 336.674062][T11107] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61c3ece6d4 [ 336.674070][T11107] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 17:14:44 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 336.796213][T11112] IPVS: ftp: loaded support on port[0] = 21 [ 336.934551][T11118] FAULT_INJECTION: forcing a failure. [ 336.934551][T11118] name failslab, interval 1, probability 0, space 0, times 0 [ 336.968098][T11118] CPU: 0 PID: 11118 Comm: syz-executor.1 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 336.978048][T11118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.988151][T11118] Call Trace: [ 336.991463][T11118] dump_stack+0x197/0x210 [ 336.995821][T11118] should_fail.cold+0xa/0x10 [ 337.000442][T11118] ? setup_fault_attr+0x220/0x220 [ 337.005485][T11118] ? ___might_sleep+0x163/0x2c0 [ 337.010357][T11118] __should_failslab+0x121/0x190 [ 337.015312][T11118] should_failslab+0x9/0x14 [ 337.019827][T11118] kmem_cache_alloc_node+0x268/0x740 [ 337.025136][T11118] __alloc_skb+0xd5/0x5e0 [ 337.031568][T11118] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 337.037122][T11118] ? __kasan_check_write+0x14/0x20 [ 337.042246][T11118] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 337.047822][T11118] netlink_ack+0x25c/0xb50 [ 337.052259][T11118] ? netlink_sendmsg+0xea0/0xea0 [ 337.057205][T11118] ? mutex_unlock+0xd/0x10 [ 337.061872][T11118] ? sock_diag_rcv_msg+0x294/0x410 [ 337.067003][T11118] netlink_rcv_skb+0x376/0x450 [ 337.071786][T11118] ? sock_diag_bind+0x80/0x80 [ 337.076556][T11118] ? netlink_ack+0xb50/0xb50 [ 337.081153][T11118] ? __kasan_check_read+0x11/0x20 [ 337.086186][T11118] ? netlink_deliver_tap+0x248/0xbe0 [ 337.091480][T11118] sock_diag_rcv+0x2b/0x40 [ 337.095900][T11118] netlink_unicast+0x58c/0x7d0 [ 337.100674][T11118] ? netlink_attachskb+0x870/0x870 [ 337.105959][T11118] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 337.112066][T11118] ? __check_object_size+0x3d/0x437 [ 337.117271][T11118] netlink_sendmsg+0x91c/0xea0 [ 337.122063][T11118] ? netlink_unicast+0x7d0/0x7d0 [ 337.127009][T11118] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 337.132577][T11118] ? apparmor_socket_sendmsg+0x2a/0x30 [ 337.138062][T11118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.144331][T11118] ? security_socket_sendmsg+0x8d/0xc0 [ 337.149803][T11118] ? netlink_unicast+0x7d0/0x7d0 [ 337.154749][T11118] sock_sendmsg+0xd7/0x130 [ 337.159171][T11118] ____sys_sendmsg+0x753/0x880 [ 337.163944][T11118] ? kernel_sendmsg+0x50/0x50 [ 337.168627][T11118] ? __fget+0x35d/0x550 [ 337.172785][T11118] ? find_held_lock+0x35/0x130 [ 337.177569][T11118] ___sys_sendmsg+0x100/0x170 [ 337.182322][T11118] ? sendmsg_copy_msghdr+0x70/0x70 [ 337.187550][T11118] ? __kasan_check_read+0x11/0x20 [ 337.192589][T11118] ? __fget+0x37f/0x550 [ 337.196855][T11118] ? do_dup2+0x4f0/0x4f0 [ 337.201096][T11118] ? __fget_light+0x1a9/0x230 [ 337.205780][T11118] ? __fdget+0x1b/0x20 [ 337.209869][T11118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.216120][T11118] __sys_sendmsg+0x105/0x1d0 [ 337.216154][T11118] ? __sys_sendmsg_sock+0xc0/0xc0 [ 337.216182][T11118] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 337.225776][T11118] ? do_syscall_64+0x26/0x790 [ 337.225794][T11118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.225810][T11118] ? do_syscall_64+0x26/0x790 [ 337.225832][T11118] __x64_sys_sendmsg+0x78/0xb0 [ 337.235953][T11118] do_syscall_64+0xfa/0x790 [ 337.235976][T11118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.235987][T11118] RIP: 0033:0x45a919 [ 337.236006][T11118] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.246719][T11118] RSP: 002b:00007f61c3ecdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.246735][T11118] RAX: ffffffffffffffda RBX: 00007f61c3ecdc90 RCX: 000000000045a919 [ 337.246745][T11118] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 337.246755][T11118] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 337.246764][T11118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61c3ece6d4 [ 337.246778][T11118] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 17:14:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:45 executing program 3 (fault-call:4 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:45 executing program 1 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:45 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, 0x0, &(0x7f0000000140)) [ 338.046042][T11127] FAULT_INJECTION: forcing a failure. [ 338.046042][T11127] name failslab, interval 1, probability 0, space 0, times 0 [ 338.066593][T11127] CPU: 0 PID: 11127 Comm: syz-executor.1 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 338.076525][T11127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.076532][T11127] Call Trace: [ 338.076551][T11127] dump_stack+0x197/0x210 [ 338.076574][T11127] should_fail.cold+0xa/0x10 [ 338.089931][T11127] ? setup_fault_attr+0x220/0x220 [ 338.103836][T11127] ? ___might_sleep+0x163/0x2c0 [ 338.103858][T11127] __should_failslab+0x121/0x190 [ 338.103880][T11127] should_failslab+0x9/0x14 [ 338.118144][T11127] kmem_cache_alloc_node_trace+0x274/0x750 [ 338.123969][T11127] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 338.129996][T11127] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 338.135810][T11127] __kmalloc_node_track_caller+0x3d/0x70 [ 338.135834][T11127] __kmalloc_reserve.isra.0+0x40/0xf0 [ 338.135853][T11127] __alloc_skb+0x10b/0x5e0 [ 338.135876][T11127] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 338.143578][T11134] FAULT_INJECTION: forcing a failure. [ 338.143578][T11134] name failslab, interval 1, probability 0, space 0, times 0 [ 338.146865][T11127] ? __kasan_check_write+0x14/0x20 [ 338.146879][T11127] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 338.146891][T11127] netlink_ack+0x25c/0xb50 [ 338.146909][T11127] ? netlink_sendmsg+0xea0/0xea0 [ 338.146920][T11127] ? mutex_unlock+0xd/0x10 [ 338.146932][T11127] ? sock_diag_rcv_msg+0x294/0x410 [ 338.146943][T11127] netlink_rcv_skb+0x376/0x450 [ 338.146953][T11127] ? sock_diag_bind+0x80/0x80 [ 338.146964][T11127] ? netlink_ack+0xb50/0xb50 [ 338.146975][T11127] ? __kasan_check_read+0x11/0x20 [ 338.146987][T11127] ? netlink_deliver_tap+0x248/0xbe0 [ 338.146999][T11127] sock_diag_rcv+0x2b/0x40 [ 338.147009][T11127] netlink_unicast+0x58c/0x7d0 [ 338.147021][T11127] ? netlink_attachskb+0x870/0x870 [ 338.147035][T11127] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 338.147049][T11127] ? __check_object_size+0x3d/0x437 [ 338.147061][T11127] netlink_sendmsg+0x91c/0xea0 [ 338.147074][T11127] ? netlink_unicast+0x7d0/0x7d0 [ 338.147086][T11127] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 338.147098][T11127] ? apparmor_socket_sendmsg+0x2a/0x30 [ 338.147110][T11127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.147124][T11127] ? security_socket_sendmsg+0x8d/0xc0 [ 338.147134][T11127] ? netlink_unicast+0x7d0/0x7d0 [ 338.147145][T11127] sock_sendmsg+0xd7/0x130 [ 338.147156][T11127] ____sys_sendmsg+0x753/0x880 [ 338.147167][T11127] ? kernel_sendmsg+0x50/0x50 [ 338.147178][T11127] ? __fget+0x35d/0x550 [ 338.147188][T11127] ? find_held_lock+0x35/0x130 [ 338.147203][T11127] ___sys_sendmsg+0x100/0x170 [ 338.147215][T11127] ? sendmsg_copy_msghdr+0x70/0x70 [ 338.147226][T11127] ? __kasan_check_read+0x11/0x20 [ 338.147238][T11127] ? __fget+0x37f/0x550 [ 338.147251][T11127] ? do_dup2+0x4f0/0x4f0 [ 338.147265][T11127] ? __fget_light+0x1a9/0x230 [ 338.147276][T11127] ? __fdget+0x1b/0x20 [ 338.147288][T11127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 338.147300][T11127] __sys_sendmsg+0x105/0x1d0 [ 338.147312][T11127] ? __sys_sendmsg_sock+0xc0/0xc0 [ 338.147329][T11127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 338.147341][T11127] ? do_syscall_64+0x26/0x790 [ 338.147351][T11127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.147362][T11127] ? do_syscall_64+0x26/0x790 [ 338.147374][T11127] __x64_sys_sendmsg+0x78/0xb0 [ 338.147387][T11127] do_syscall_64+0xfa/0x790 [ 338.147400][T11127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.147408][T11127] RIP: 0033:0x45a919 [ 338.147421][T11127] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.147427][T11127] RSP: 002b:00007f61c3ecdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 338.147438][T11127] RAX: ffffffffffffffda RBX: 00007f61c3ecdc90 RCX: 000000000045a919 [ 338.147445][T11127] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 338.147451][T11127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 338.147457][T11127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61c3ece6d4 [ 338.147463][T11127] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 [ 338.305516][T11137] FAULT_INJECTION: forcing a failure. [ 338.305516][T11137] name failslab, interval 1, probability 0, space 0, times 0 [ 338.309673][T11134] CPU: 1 PID: 11134 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 338.309681][T11134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.309686][T11134] Call Trace: [ 338.309705][T11134] dump_stack+0x197/0x210 [ 338.309733][T11134] should_fail.cold+0xa/0x10 [ 338.509468][T11134] ? setup_fault_attr+0x220/0x220 [ 338.514482][T11134] ? __kasan_check_read+0x11/0x20 [ 338.519497][T11134] __should_failslab+0x121/0x190 [ 338.524423][T11134] should_failslab+0x9/0x14 [ 338.528915][T11134] __kmalloc+0x71/0x770 [ 338.533064][T11134] ? mark_held_locks+0xf0/0xf0 [ 338.537818][T11134] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 338.543617][T11134] __tty_buffer_request_room+0x1fb/0x5c0 [ 338.549240][T11134] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 338.555479][T11134] pty_write+0x133/0x200 [ 338.559731][T11134] tty_put_char+0x130/0x160 [ 338.564218][T11134] ? tty_hung_up_p+0x70/0x70 [ 338.568793][T11134] ? tty_buffer_space_avail+0x5c/0xb0 [ 338.574171][T11134] ? pty_write_room+0xc8/0xf0 [ 338.578843][T11134] ? pty_stop+0x1b0/0x1b0 [ 338.583171][T11134] __process_echoes+0x5c8/0xa40 [ 338.588013][T11134] n_tty_receive_buf_common+0xc77/0x2b70 [ 338.593630][T11134] ? __might_fault+0x12b/0x1e0 [ 338.598389][T11134] ? n_tty_receive_buf2+0x40/0x40 [ 338.603401][T11134] n_tty_receive_buf+0x31/0x40 [ 338.608150][T11134] tty_ioctl+0x949/0x14f0 [ 338.612486][T11134] ? tty_vhangup+0x30/0x30 [ 338.616915][T11134] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 338.623141][T11134] ? do_vfs_ioctl+0x11b/0x1340 [ 338.627893][T11134] ? ioctl_file_clone+0x180/0x180 [ 338.632908][T11134] ? __fget+0x37f/0x550 [ 338.637053][T11134] ? do_dup2+0x4f0/0x4f0 [ 338.641282][T11134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 338.647511][T11134] ? fput_many+0x12c/0x1a0 [ 338.651932][T11134] ? tomoyo_file_ioctl+0x23/0x30 [ 338.656860][T11134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.663097][T11134] ? security_file_ioctl+0x8d/0xc0 [ 338.668213][T11134] ? tty_vhangup+0x30/0x30 [ 338.672636][T11134] ksys_ioctl+0x123/0x180 [ 338.676983][T11134] __x64_sys_ioctl+0x73/0xb0 [ 338.681581][T11134] do_syscall_64+0xfa/0x790 [ 338.686090][T11134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.691984][T11134] RIP: 0033:0x45a919 [ 338.695875][T11134] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.715479][T11134] RSP: 002b:00007f1bba6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.723885][T11134] RAX: ffffffffffffffda RBX: 00007f1bba6c7c90 RCX: 000000000045a919 [ 338.731837][T11134] RDX: 0000000020000040 RSI: 0000000000005412 RDI: 0000000000000004 [ 338.739798][T11134] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:14:45 executing program 1 (fault-call:1 fault-nth:5): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 338.747751][T11134] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bba6c86d4 [ 338.755702][T11134] R13: 00000000004c5a54 R14: 00000000004dbd50 R15: 0000000000000005 [ 338.763671][ C1] [ 338.763676][ C1] ====================================================== [ 338.763680][ C1] WARNING: possible circular locking dependency detected [ 338.763684][ C1] 5.5.0-rc2-next-20191220-syzkaller #0 Not tainted [ 338.763688][ C1] ------------------------------------------------------ [ 338.763693][ C1] syz-executor.3/11134 is trying to acquire lock: [ 338.763695][ C1] ffffffff899a48a0 (console_owner){-.-.}, at: vprintk_emit+0x3fd/0x700 [ 338.763708][ C1] [ 338.763711][ C1] but task is already holding lock: [ 338.763714][ C1] ffff8880a8057140 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 338.763726][ C1] [ 338.763730][ C1] which lock already depends on the new lock. [ 338.763732][ C1] [ 338.763734][ C1] [ 338.763739][ C1] the existing dependency chain (in reverse order) is: [ 338.763741][ C1] [ 338.763743][ C1] -> #2 (&(&port->lock)->rlock){-.-.}: [ 338.763756][ C1] _raw_spin_lock_irqsave+0x95/0xcd [ 338.763760][ C1] tty_port_tty_get+0x24/0x100 [ 338.763764][ C1] tty_port_default_wakeup+0x16/0x40 [ 338.763767][ C1] tty_port_tty_wakeup+0x57/0x70 [ 338.763771][ C1] uart_write_wakeup+0x46/0x70 [ 338.763774][ C1] serial8250_tx_chars+0x495/0xaf0 [ 338.763779][ C1] serial8250_handle_irq.part.0+0x2f4/0x3a0 [ 338.763783][ C1] serial8250_default_handle_irq+0xc0/0x150 [ 338.763787][ C1] serial8250_interrupt+0xf1/0x1a0 [ 338.763791][ C1] __handle_irq_event_percpu+0x15d/0x970 [ 338.763803][T11137] CPU: 0 PID: 11137 Comm: syz-executor.1 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 338.763806][ C1] handle_irq_event_percpu+0x74/0x160 [ 338.763816][ C1] handle_irq_event+0xa7/0x134 [ 338.763819][ C1] handle_edge_irq+0x25e/0x8d0 [ 338.763822][ C1] do_IRQ+0xde/0x280 [ 338.763825][ C1] ret_from_intr+0x0/0x36 [ 338.763828][ C1] _raw_spin_unlock_irqrestore+0x90/0xe0 [ 338.763831][ C1] uart_write+0x3a9/0x6c0 [ 338.763834][ C1] n_tty_write+0x40e/0x1080 [ 338.763837][ C1] tty_write+0x496/0x7f0 [ 338.763841][ C1] redirected_tty_write+0xb2/0xc0 [ 338.763844][ C1] __vfs_write+0x8a/0x110 [ 338.763848][ C1] vfs_write+0x268/0x5d0 [ 338.763851][ C1] ksys_write+0x14f/0x290 [ 338.763855][ C1] __x64_sys_write+0x73/0xb0 [ 338.763858][ C1] do_syscall_64+0xfa/0x790 [ 338.763862][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.763864][ C1] [ 338.763867][ C1] -> #1 (&port_lock_key){-.-.}: [ 338.763879][ C1] _raw_spin_lock_irqsave+0x95/0xcd [ 338.763883][ C1] serial8250_console_write+0x253/0x9a0 [ 338.763887][ C1] univ8250_console_write+0x5f/0x70 [ 338.763891][ C1] console_unlock+0xb7a/0xf00 [ 338.763894][ C1] vprintk_emit+0x2a0/0x700 [ 338.763898][ C1] vprintk_default+0x28/0x30 [ 338.763901][ C1] vprintk_func+0x7e/0x189 [ 338.763905][ C1] printk+0xba/0xed [ 338.763908][ C1] register_console+0x745/0xb50 [ 338.763912][ C1] univ8250_console_init+0x3e/0x4b [ 338.763916][ C1] console_init+0x461/0x67b [ 338.763919][ C1] start_kernel+0x653/0x943 [ 338.763923][ C1] x86_64_start_reservations+0x29/0x2b [ 338.763927][ C1] x86_64_start_kernel+0x77/0x7b [ 338.763931][ C1] secondary_startup_64+0xa4/0xb0 [ 338.763933][ C1] [ 338.763935][ C1] -> #0 (console_owner){-.-.}: [ 338.763947][ C1] __lock_acquire+0x2596/0x4a00 [ 338.763951][ C1] lock_acquire+0x190/0x410 [ 338.763954][ C1] vprintk_emit+0x43a/0x700 [ 338.763958][ C1] vprintk_default+0x28/0x30 [ 338.763962][ C1] vprintk_func+0x7e/0x189 [ 338.763965][ C1] printk+0xba/0xed [ 338.763968][ C1] should_fail+0x6f1/0x860 [ 338.763972][ C1] __should_failslab+0x121/0x190 [ 338.763976][ C1] should_failslab+0x9/0x14 [ 338.763979][ C1] __kmalloc+0x71/0x770 [ 338.763983][ C1] __tty_buffer_request_room+0x1fb/0x5c0 [ 338.763988][ C1] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 338.763991][ C1] pty_write+0x133/0x200 [ 338.763995][ C1] tty_put_char+0x130/0x160 [ 338.763998][ C1] __process_echoes+0x5c8/0xa40 [ 338.764003][ C1] n_tty_receive_buf_common+0xc77/0x2b70 [ 338.764006][ C1] n_tty_receive_buf+0x31/0x40 [ 338.764010][ C1] tty_ioctl+0x949/0x14f0 [ 338.764013][ C1] ksys_ioctl+0x123/0x180 [ 338.764017][ C1] __x64_sys_ioctl+0x73/0xb0 [ 338.764021][ C1] do_syscall_64+0xfa/0x790 [ 338.764025][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.764027][ C1] [ 338.764031][ C1] other info that might help us debug this: [ 338.764033][ C1] [ 338.764036][ C1] Chain exists of: [ 338.764038][ C1] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 338.764054][ C1] [ 338.764058][ C1] Possible unsafe locking scenario: [ 338.764060][ C1] [ 338.764064][ C1] CPU0 CPU1 [ 338.764067][ C1] ---- ---- [ 338.764069][ C1] lock(&(&port->lock)->rlock); [ 338.764078][ C1] lock(&port_lock_key); [ 338.764087][ C1] lock(&(&port->lock)->rlock); [ 338.764094][ C1] lock(console_owner); [ 338.764101][ C1] [ 338.764104][ C1] *** DEADLOCK *** [ 338.764106][ C1] [ 338.764110][ C1] 4 locks held by syz-executor.3/11134: [ 338.764112][ C1] #0: ffff8880a6ca0090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 338.764127][ C1] #1: ffff8880a6ca02a0 (&o_tty->termios_rwsem/1){++++}, at: n_tty_receive_buf_common+0x8a/0x2b70 [ 338.764145][ C1] #2: ffffc90017813360 (&ldata->output_lock){+.+.}, at: n_tty_receive_buf_common+0xc3a/0x2b70 [ 338.764161][ C1] #3: ffff8880a8057140 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 338.764176][ C1] [ 338.764179][ C1] stack backtrace: [ 338.764185][ C1] CPU: 1 PID: 11134 Comm: syz-executor.3 Not tainted 5.5.0-rc2-next-20191220-syzkaller #0 [ 338.764192][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.764194][ C1] Call Trace: [ 338.764198][ C1] dump_stack+0x197/0x210 [ 338.764202][ C1] print_circular_bug.isra.0.cold+0x163/0x172 [ 338.764205][ C1] check_noncircular+0x32e/0x3e0 [ 338.764209][ C1] ? print_circular_bug.isra.0+0x230/0x230 [ 338.764213][ C1] ? print_circular_bug.isra.0+0x230/0x230 [ 338.764217][ C1] ? alloc_list_entry+0xc0/0xc0 [ 338.764221][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 338.764224][ C1] ? find_first_zero_bit+0x9a/0xc0 [ 338.764228][ C1] __lock_acquire+0x2596/0x4a00 [ 338.764231][ C1] ? mark_held_locks+0xf0/0xf0 [ 338.764234][ C1] lock_acquire+0x190/0x410 [ 338.764238][ C1] ? vprintk_emit+0x3fd/0x700 [ 338.764241][ C1] vprintk_emit+0x43a/0x700 [ 338.764245][ C1] ? vprintk_emit+0x3fd/0x700 [ 338.764248][ C1] vprintk_default+0x28/0x30 [ 338.764251][ C1] vprintk_func+0x7e/0x189 [ 338.764254][ C1] printk+0xba/0xed [ 338.764258][ C1] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 338.764262][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.764265][ C1] ? ___ratelimit+0x60/0x595 [ 338.764268][ C1] should_fail+0x6f1/0x860 [ 338.764272][ C1] ? setup_fault_attr+0x220/0x220 [ 338.764275][ C1] ? __kasan_check_read+0x11/0x20 [ 338.764279][ C1] __should_failslab+0x121/0x190 [ 338.764282][ C1] should_failslab+0x9/0x14 [ 338.764285][ C1] __kmalloc+0x71/0x770 [ 338.764289][ C1] ? mark_held_locks+0xf0/0xf0 [ 338.764293][ C1] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 338.764297][ C1] __tty_buffer_request_room+0x1fb/0x5c0 [ 338.764301][ C1] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 338.764304][ C1] pty_write+0x133/0x200 [ 338.764307][ C1] tty_put_char+0x130/0x160 [ 338.764311][ C1] ? tty_hung_up_p+0x70/0x70 [ 338.764314][ C1] ? tty_buffer_space_avail+0x5c/0xb0 [ 338.764318][ C1] ? pty_write_room+0xc8/0xf0 [ 338.764321][ C1] ? pty_stop+0x1b0/0x1b0 [ 338.764325][ C1] __process_echoes+0x5c8/0xa40 [ 338.764329][ C1] n_tty_receive_buf_common+0xc77/0x2b70 [ 338.764332][ C1] ? __might_fault+0x12b/0x1e0 [ 338.764341][ C1] ? n_tty_receive_buf2+0x40/0x40 [ 338.764345][ C1] n_tty_receive_buf+0x31/0x40 [ 338.764348][ C1] tty_ioctl+0x949/0x14f0 [ 338.764351][ C1] ? tty_vhangup+0x30/0x30 [ 338.764355][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 338.764359][ C1] ? do_vfs_ioctl+0x11b/0x1340 [ 338.764362][ C1] ? ioctl_file_clone+0x180/0x180 [ 338.764365][ C1] ? __fget+0x37f/0x550 [ 338.764368][ C1] ? do_dup2+0x4f0/0x4f0 [ 338.764373][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 338.764376][ C1] ? fput_many+0x12c/0x1a0 [ 338.764379][ C1] ? tomoyo_file_ioctl+0x23/0x30 [ 338.764384][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.764387][ C1] ? security_file_ioctl+0x8d/0xc0 [ 338.764390][ C1] ? tty_vhangup+0x30/0x30 [ 338.764394][ C1] ksys_ioctl+0x123/0x180 [ 338.764397][ C1] __x64_sys_ioctl+0x73/0xb0 [ 338.764400][ C1] do_syscall_64+0xfa/0x790 [ 338.764404][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.764407][ C1] RIP: 0033:0x45a919 [ 338.764419][ C1] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.764423][ C1] RSP: 002b:00007f1bba6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.764431][ C1] RAX: ffffffffffffffda RBX: 00007f1bba6c7c90 RCX: 000000000045a919 [ 338.764436][ C1] RDX: 0000000020000040 RSI: 0000000000005412 RDI: 0000000000000004 [ 338.764441][ C1] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 338.764447][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bba6c86d4 [ 338.764451][ C1] R13: 00000000004c5a54 R14: 00000000004dbd50 R15: 0000000000000005 [ 338.767025][ T4108] kobject: 'loop1' (00000000b10a0040): kobject_uevent_env [ 338.773143][T11137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.773148][T11137] Call Trace: [ 338.773164][T11137] dump_stack+0x197/0x210 [ 338.773181][T11137] should_fail.cold+0xa/0x10 [ 338.773201][T11137] ? __kasan_check_read+0x11/0x20 [ 338.784589][ T4108] kobject: 'loop1' (00000000b10a0040): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 338.786695][T11137] ? setup_fault_attr+0x220/0x220 [ 338.786781][T11137] ? sk_filter_trim_cap+0x3e8/0xb20 [ 338.795511][T11129] IPVS: ftp: loaded support on port[0] = 21 [ 338.800214][T11137] ? __kasan_check_read+0x11/0x20 [ 338.800231][T11137] __should_failslab+0x121/0x190 [ 338.800248][T11137] should_failslab+0x9/0x14 [ 338.800259][T11137] kmem_cache_alloc+0x47/0x710 [ 338.800280][T11137] ? lock_acquire+0x190/0x410 [ 338.810309][ T4108] kobject: 'loop4' (000000001ca20e6b): kobject_uevent_env [ 338.810818][T11137] ? netlink_deliver_tap+0x145/0xbe0 [ 338.810836][T11137] skb_clone+0x154/0x3d0 [ 338.816086][ T4108] kobject: 'loop4' (000000001ca20e6b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 338.824595][T11137] netlink_deliver_tap+0x93c/0xbe0 [ 338.824611][T11137] __netlink_sendskb+0x62/0xc0 [ 338.824623][T11137] netlink_unicast+0x6ab/0x7d0 [ 338.824636][T11137] ? netlink_attachskb+0x870/0x870 [ 338.824655][T11137] netlink_ack+0x607/0xb50 [ 338.840055][T11129] kobject: 'lo' (00000000a7a70e95): kobject_add_internal: parent: 'net', set: 'devices' [ 338.844484][T11137] ? netlink_sendmsg+0xea0/0xea0 [ 338.844506][T11137] ? mutex_unlock+0xd/0x10 [ 338.854016][T11129] kobject: 'lo' (00000000a7a70e95): kobject_uevent_env [ 338.857960][T11137] ? sock_diag_rcv_msg+0x294/0x410 [ 338.857975][T11137] netlink_rcv_skb+0x376/0x450 [ 338.857988][T11137] ? sock_diag_bind+0x80/0x80 [ 338.857999][T11137] ? netlink_ack+0xb50/0xb50 [ 338.858012][T11137] ? netlink_deliver_tap+0x248/0xbe0 [ 338.858029][T11137] sock_diag_rcv+0x2b/0x40 [ 338.871774][T11129] kobject: 'lo' (00000000a7a70e95): fill_kobj_path: path = '/devices/virtual/net/lo' [ 338.874568][T11137] netlink_unicast+0x58c/0x7d0 [ 338.874591][T11137] ? netlink_attachskb+0x870/0x870 [ 338.880010][T11129] kobject: 'queues' (000000008252cdcb): kobject_add_internal: parent: 'lo', set: '' [ 338.885559][T11137] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 338.885575][T11137] ? __check_object_size+0x3d/0x437 [ 338.885593][T11137] netlink_sendmsg+0x91c/0xea0 [ 338.892616][T11129] kobject: 'queues' (000000008252cdcb): kobject_uevent_env [ 338.898376][T11137] ? netlink_unicast+0x7d0/0x7d0 [ 338.898391][T11137] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 338.898406][T11137] ? apparmor_socket_sendmsg+0x2a/0x30 [ 338.898427][T11137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.904105][T11129] kobject: 'queues' (000000008252cdcb): kobject_uevent_env: filter function caused the event to drop! [ 338.910195][T11137] ? security_socket_sendmsg+0x8d/0xc0 [ 338.910209][T11137] ? netlink_unicast+0x7d0/0x7d0 [ 338.910222][T11137] sock_sendmsg+0xd7/0x130 [ 338.910235][T11137] ____sys_sendmsg+0x753/0x880 [ 338.910252][T11137] ? kernel_sendmsg+0x50/0x50 [ 338.920600][T11129] kobject: 'rx-0' (00000000acfa9fbe): kobject_add_internal: parent: 'queues', set: 'queues' [ 338.926047][T11137] ___sys_sendmsg+0x100/0x170 [ 338.926070][T11137] ? sendmsg_copy_msghdr+0x70/0x70 [ 338.931475][T11129] kobject: 'rx-0' (00000000acfa9fbe): kobject_uevent_env [ 338.936626][T11137] ? __fget+0x37f/0x550 [ 338.936642][T11137] ? do_dup2+0x4f0/0x4f0 [ 338.936661][T11137] ? __fget_light+0x1a9/0x230 [ 338.945400][T11129] kobject: 'rx-0' (00000000acfa9fbe): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 338.945891][T11137] ? __fdget+0x1b/0x20 [ 338.945913][T11137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 338.952180][T11129] kobject: 'tx-0' (0000000087a79cb9): kobject_add_internal: parent: 'queues', set: 'queues' [ 338.956869][T11137] __sys_sendmsg+0x105/0x1d0 [ 338.956887][T11137] ? __sys_sendmsg_sock+0xc0/0xc0 [ 340.097248][T11137] ? switch_fpu_return+0x1f9/0x4f0 [ 340.102348][T11137] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 340.108406][T11137] __x64_sys_sendmsg+0x78/0xb0 [ 340.113166][T11137] do_syscall_64+0xfa/0x790 [ 340.117655][T11137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.123552][T11137] RIP: 0033:0x45a919 [ 340.127432][T11137] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.147014][T11137] RSP: 002b:00007f61c3ecdc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 340.155423][T11137] RAX: ffffffffffffffda RBX: 00007f61c3ecdc90 RCX: 000000000045a919 [ 340.163378][T11137] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 340.171329][T11137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 340.179280][T11137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f61c3ece6d4 [ 340.187317][T11137] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 [ 340.225091][T11129] kobject: 'tx-0' (0000000087a79cb9): kobject_uevent_env [ 340.254487][T11129] kobject: 'tx-0' (0000000087a79cb9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' 17:14:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 340.270802][T11129] kobject: 'tunl0' (000000002d9fb83c): kobject_add_internal: parent: 'net', set: 'devices' [ 340.283932][T11129] kobject: 'tunl0' (000000002d9fb83c): kobject_uevent_env [ 340.291682][T11129] kobject: 'tunl0' (000000002d9fb83c): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 340.310778][T11129] kobject: 'queues' (0000000060cac2b7): kobject_add_internal: parent: 'tunl0', set: '' 17:14:47 executing program 3 (fault-call:4 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 340.327109][ T4108] kobject: 'loop1' (00000000b10a0040): kobject_uevent_env [ 340.337036][T11129] kobject: 'queues' (0000000060cac2b7): kobject_uevent_env [ 340.344425][ T4108] kobject: 'loop1' (00000000b10a0040): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 340.354727][T11129] kobject: 'queues' (0000000060cac2b7): kobject_uevent_env: filter function caused the event to drop! [ 340.385807][ T4108] kobject: 'loop3' (00000000df1053be): kobject_uevent_env [ 340.401927][T11129] kobject: 'rx-0' (00000000c37d0698): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.414474][ T4108] kobject: 'loop3' (00000000df1053be): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 340.418366][T11129] kobject: 'rx-0' (00000000c37d0698): kobject_uevent_env [ 340.436083][T11129] kobject: 'rx-0' (00000000c37d0698): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 340.447508][T11129] kobject: 'tx-0' (0000000095181bb8): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.466074][ T4108] kobject: 'loop1' (00000000b10a0040): kobject_uevent_env [ 340.469512][T11129] kobject: 'tx-0' (0000000095181bb8): kobject_uevent_env [ 340.482043][ T4108] kobject: 'loop1' (00000000b10a0040): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 340.487727][T11129] kobject: 'tx-0' (0000000095181bb8): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 340.506917][ T197] kobject: 'erspan0' (0000000064814b72): kobject_cleanup, parent 00000000608fd6d8 [ 340.516256][T11109] kobject: 'ip_vti0' (00000000635a21b6): kobject_cleanup, parent 00000000608fd6d8 [ 340.525944][ T4108] kobject: 'loop3' (00000000df1053be): kobject_uevent_env [ 340.533972][T11129] kobject: 'gre0' (000000006c72c0f0): kobject_add_internal: parent: 'net', set: 'devices' [ 340.534751][ T4108] kobject: 'loop3' (00000000df1053be): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 340.546849][ T197] kobject: 'erspan0' (0000000064814b72): calling ktype release [ 340.564099][T11109] kobject: 'ip_vti0' (00000000635a21b6): calling ktype release [ 340.571736][T11109] kobject: 'ip_vti0': free name [ 340.577277][T11129] kobject: 'gre0' (000000006c72c0f0): kobject_uevent_env [ 340.584881][ T197] kobject: 'erspan0': free name [ 340.589914][T11129] kobject: 'gre0' (000000006c72c0f0): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 340.599876][T11129] kobject: 'queues' (00000000183a85c2): kobject_add_internal: parent: 'gre0', set: '' [ 340.610008][T11129] kobject: 'queues' (00000000183a85c2): kobject_uevent_env [ 340.617214][T11129] kobject: 'queues' (00000000183a85c2): kobject_uevent_env: filter function caused the event to drop! [ 340.628344][T11129] kobject: 'rx-0' (000000003e9168d6): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.638534][T11129] kobject: 'rx-0' (000000003e9168d6): kobject_uevent_env [ 340.645597][T11129] kobject: 'rx-0' (000000003e9168d6): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 340.657468][T11129] kobject: 'tx-0' (0000000037a4312e): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.667786][T11129] kobject: 'tx-0' (0000000037a4312e): kobject_uevent_env [ 340.675139][T11129] kobject: 'tx-0' (0000000037a4312e): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 340.687447][T11129] kobject: 'gretap0' (00000000ec0e3d41): kobject_add_internal: parent: 'net', set: 'devices' [ 340.698333][T11129] kobject: 'gretap0' (00000000ec0e3d41): kobject_uevent_env [ 340.705682][T11129] kobject: 'gretap0' (00000000ec0e3d41): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 340.716176][T11129] kobject: 'queues' (00000000df56416a): kobject_add_internal: parent: 'gretap0', set: '' [ 340.726562][T11129] kobject: 'queues' (00000000df56416a): kobject_uevent_env [ 340.733801][T11129] kobject: 'queues' (00000000df56416a): kobject_uevent_env: filter function caused the event to drop! [ 340.744892][T11129] kobject: 'rx-0' (00000000bbbdcfba): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.755274][T11129] kobject: 'rx-0' (00000000bbbdcfba): kobject_uevent_env [ 340.763492][T11129] kobject: 'rx-0' (00000000bbbdcfba): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 340.774998][T11129] kobject: 'tx-0' (0000000083bb8261): kobject_add_internal: parent: 'queues', set: 'queues' [ 340.785235][T11129] kobject: 'tx-0' (0000000083bb8261): kobject_uevent_env [ 340.792332][T11129] kobject: 'tx-0' (0000000083bb8261): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 340.804053][T11129] kobject: 'batman_adv' (00000000d32794a4): kobject_add_internal: parent: 'gretap0', set: '' [ 340.816418][T11109] kobject: 'batman_adv' (000000008105718c): kobject_uevent_env [ 340.825088][T11109] kobject: 'batman_adv' (000000008105718c): kobject_uevent_env: filter function caused the event to drop! [ 340.836691][T11109] kobject: 'batman_adv' (000000008105718c): kobject_cleanup, parent 00000000608fd6d8 [ 340.846230][T11109] kobject: 'batman_adv' (000000008105718c): calling ktype release [ 340.854594][T11109] kobject: (000000008105718c): dynamic_kobj_release [ 340.861447][T11109] kobject: 'batman_adv': free name [ 340.866955][T11109] kobject: 'rx-0' (000000008fd0b7f2): kobject_cleanup, parent 00000000b255ba15 [ 340.876802][T11109] kobject: 'rx-0' (000000008fd0b7f2): auto cleanup 'remove' event [ 340.884857][T11109] kobject: 'rx-0' (000000008fd0b7f2): kobject_uevent_env [ 340.892468][T11109] kobject: 'rx-0' (000000008fd0b7f2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 340.903852][T11109] kobject: 'rx-0' (000000008fd0b7f2): auto cleanup kobject_del [ 340.912099][T11109] kobject: 'rx-0' (000000008fd0b7f2): calling ktype release [ 340.919439][T11109] kobject: 'rx-0': free name [ 340.924086][T11109] kobject: 'tx-0' (00000000d44041bb): kobject_cleanup, parent 00000000b255ba15 [ 340.933254][T11109] kobject: 'tx-0' (00000000d44041bb): auto cleanup 'remove' event [ 340.941129][T11109] kobject: 'tx-0' (00000000d44041bb): kobject_uevent_env [ 340.948239][T11109] kobject: 'tx-0' (00000000d44041bb): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 340.959433][T11109] kobject: 'tx-0' (00000000d44041bb): auto cleanup kobject_del [ 340.967033][T11109] kobject: 'tx-0' (00000000d44041bb): calling ktype release [ 340.974354][T11109] kobject: 'tx-0': free name [ 340.980190][T11109] kobject: 'queues' (00000000b255ba15): kobject_cleanup, parent 00000000608fd6d8 [ 340.989375][T11109] kobject: 'queues' (00000000b255ba15): calling ktype release [ 340.996830][T11109] kobject: 'queues' (00000000b255ba15): kset_release [ 341.003599][T11109] kobject: 'queues': free name [ 341.009099][T11109] kobject: 'erspan0' (000000006f382c6d): kobject_uevent_env [ 341.017427][T11109] kobject: 'erspan0' (000000006f382c6d): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 341.028366][T11129] kobject: 'erspan0' (000000005a1a8c78): kobject_add_internal: parent: 'net', set: 'devices' [ 341.039039][T11129] kobject: 'erspan0' (000000005a1a8c78): kobject_uevent_env [ 341.046447][T11129] kobject: 'erspan0' (000000005a1a8c78): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 341.057218][T11129] kobject: 'queues' (000000009079f76f): kobject_add_internal: parent: 'erspan0', set: '' [ 341.068223][T11129] kobject: 'queues' (000000009079f76f): kobject_uevent_env [ 341.075512][T11129] kobject: 'queues' (000000009079f76f): kobject_uevent_env: filter function caused the event to drop! [ 341.086514][T11129] kobject: 'rx-0' (00000000536b2980): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.097727][T11129] kobject: 'rx-0' (00000000536b2980): kobject_uevent_env [ 341.104883][T11129] kobject: 'rx-0' (00000000536b2980): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 341.116461][T11129] kobject: 'tx-0' (000000008d5cbd13): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.126740][T11129] kobject: 'tx-0' (000000008d5cbd13): kobject_uevent_env [ 341.134202][T11129] kobject: 'tx-0' (000000008d5cbd13): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 341.137946][ T4108] kobject: 'loop5' (000000003c78001b): kobject_uevent_env [ 341.146381][T11129] kobject: 'batman_adv' (00000000153993a4): kobject_add_internal: parent: 'erspan0', set: '' [ 341.159564][ T4108] kobject: 'loop5' (000000003c78001b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 341.164448][T11129] kobject: 'ip_vti0' (00000000c4ec5198): kobject_add_internal: parent: 'net', set: 'devices' [ 341.187239][T11129] kobject: 'ip_vti0' (00000000c4ec5198): kobject_uevent_env [ 341.194779][T11129] kobject: 'ip_vti0' (00000000c4ec5198): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 341.208976][T11129] kobject: 'queues' (000000004c70b2ac): kobject_add_internal: parent: 'ip_vti0', set: '' [ 341.220900][T11129] kobject: 'queues' (000000004c70b2ac): kobject_uevent_env [ 341.228163][T11129] kobject: 'queues' (000000004c70b2ac): kobject_uevent_env: filter function caused the event to drop! [ 341.239464][T11129] kobject: 'rx-0' (0000000094ce8d9e): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.249753][T11129] kobject: 'rx-0' (0000000094ce8d9e): kobject_uevent_env [ 341.256998][T11129] kobject: 'rx-0' (0000000094ce8d9e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 341.268267][T11129] kobject: 'tx-0' (00000000e9ac04c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.278527][T11129] kobject: 'tx-0' (00000000e9ac04c6): kobject_uevent_env [ 341.285681][T11129] kobject: 'tx-0' (00000000e9ac04c6): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 341.297499][ T197] kobject: 'erspan0' (0000000088073430): kobject_cleanup, parent 00000000608fd6d8 [ 341.297508][T11109] kobject: 'erspan0' (000000006f382c6d): kobject_cleanup, parent 00000000608fd6d8 [ 341.297521][T11109] kobject: 'erspan0' (000000006f382c6d): calling ktype release [ 341.309882][ T197] kobject: 'erspan0' (0000000088073430): calling ktype release [ 341.316419][T11129] kobject: 'ip6_vti0' (00000000970cd56e): kobject_add_internal: parent: 'net', set: 'devices' [ 341.326255][ T197] kobject: 'erspan0': free name [ 341.332274][T11109] kobject: 'erspan0': free name [ 341.351635][T11129] kobject: 'ip6_vti0' (00000000970cd56e): kobject_uevent_env [ 341.359551][T11129] kobject: 'ip6_vti0' (00000000970cd56e): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 341.370264][T11129] kobject: 'queues' (000000001bb78da9): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 341.380835][T11129] kobject: 'queues' (000000001bb78da9): kobject_uevent_env [ 341.388083][T11129] kobject: 'queues' (000000001bb78da9): kobject_uevent_env: filter function caused the event to drop! [ 341.399408][T11129] kobject: 'rx-0' (00000000604e2b07): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.409717][T11129] kobject: 'rx-0' (00000000604e2b07): kobject_uevent_env [ 341.416759][T11129] kobject: 'rx-0' (00000000604e2b07): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 341.428123][T11129] kobject: 'tx-0' (00000000f8c147ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.441282][T11129] kobject: 'tx-0' (00000000f8c147ac): kobject_uevent_env [ 341.449485][T11129] kobject: 'tx-0' (00000000f8c147ac): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 341.462599][T11109] kobject: 'batman_adv' (00000000b818c871): kobject_uevent_env [ 341.470210][T11109] kobject: 'batman_adv' (00000000b818c871): kobject_uevent_env: filter function caused the event to drop! [ 341.481699][T11109] kobject: 'batman_adv' (00000000b818c871): kobject_cleanup, parent 00000000608fd6d8 [ 341.491321][T11109] kobject: 'batman_adv' (00000000b818c871): calling ktype release [ 341.499172][T11109] kobject: (00000000b818c871): dynamic_kobj_release [ 341.505774][T11109] kobject: 'batman_adv': free name [ 341.511188][T11109] kobject: 'rx-0' (00000000690d017b): kobject_cleanup, parent 000000005bd84570 [ 341.520162][T11109] kobject: 'rx-0' (00000000690d017b): auto cleanup 'remove' event [ 341.528074][T11109] kobject: 'rx-0' (00000000690d017b): kobject_uevent_env [ 341.535137][T11109] kobject: 'rx-0' (00000000690d017b): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 341.546440][T11109] kobject: 'rx-0' (00000000690d017b): auto cleanup kobject_del [ 341.554819][T11109] kobject: 'rx-0' (00000000690d017b): calling ktype release [ 341.563026][T11109] kobject: 'rx-0': free name [ 341.567668][T11109] kobject: 'tx-0' (00000000b7428ac0): kobject_cleanup, parent 000000005bd84570 [ 341.576647][T11109] kobject: 'tx-0' (00000000b7428ac0): auto cleanup 'remove' event [ 341.584484][T11109] kobject: 'tx-0' (00000000b7428ac0): kobject_uevent_env [ 341.592002][T11109] kobject: 'tx-0' (00000000b7428ac0): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 341.603207][T11109] kobject: 'tx-0' (00000000b7428ac0): auto cleanup kobject_del [ 341.610883][T11109] kobject: 'tx-0' (00000000b7428ac0): calling ktype release [ 341.618200][T11109] kobject: 'tx-0': free name [ 341.622851][T11109] kobject: 'queues' (000000005bd84570): kobject_cleanup, parent 00000000608fd6d8 [ 341.632349][T11109] kobject: 'queues' (000000005bd84570): calling ktype release [ 341.639833][T11109] kobject: 'queues' (000000005bd84570): kset_release [ 341.646508][T11109] kobject: 'queues': free name [ 341.651774][T11109] kobject: 'gretap0' (000000009e86f487): kobject_uevent_env [ 341.659805][T11109] kobject: 'gretap0' (000000009e86f487): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 341.670594][ T197] kobject: 'erspan0' (000000004cf91ea4): kobject_cleanup, parent 00000000608fd6d8 [ 341.681112][ T197] kobject: 'erspan0' (000000004cf91ea4): calling ktype release [ 341.688745][ T197] kobject: 'erspan0': free name [ 341.694368][ T197] kobject: 'batman_adv' (000000008815429e): kobject_uevent_env [ 341.702476][ T197] kobject: 'batman_adv' (000000008815429e): kobject_uevent_env: filter function caused the event to drop! [ 341.713855][ T197] kobject: 'batman_adv' (000000008815429e): kobject_cleanup, parent 00000000608fd6d8 [ 341.723356][ T197] kobject: 'batman_adv' (000000008815429e): calling ktype release [ 341.731749][ T197] kobject: (000000008815429e): dynamic_kobj_release [ 341.738450][ T197] kobject: 'batman_adv': free name [ 341.743678][ T197] kobject: 'rx-0' (00000000c282af72): kobject_cleanup, parent 00000000bfa3c8ed [ 341.752634][ T197] kobject: 'rx-0' (00000000c282af72): auto cleanup 'remove' event [ 341.760526][ T197] kobject: 'rx-0' (00000000c282af72): kobject_uevent_env [ 341.767644][ T197] kobject: 'rx-0' (00000000c282af72): kobject_uevent_env: uevent_suppress caused the event to drop! [ 341.778461][ T197] kobject: 'rx-0' (00000000c282af72): auto cleanup kobject_del [ 341.786139][ T197] kobject: 'rx-0' (00000000c282af72): calling ktype release [ 341.793469][ T197] kobject: 'rx-0': free name [ 341.798342][ T197] kobject: 'tx-0' (0000000076167b14): kobject_cleanup, parent 00000000bfa3c8ed [ 341.807294][ T197] kobject: 'tx-0' (0000000076167b14): auto cleanup 'remove' event [ 341.815132][ T197] kobject: 'tx-0' (0000000076167b14): kobject_uevent_env [ 341.822230][ T197] kobject: 'tx-0' (0000000076167b14): kobject_uevent_env: uevent_suppress caused the event to drop! [ 341.833312][ T197] kobject: 'tx-0' (0000000076167b14): auto cleanup kobject_del [ 341.841477][ T197] kobject: 'tx-0' (0000000076167b14): calling ktype release [ 341.848806][ T197] kobject: 'tx-0': free name [ 341.853450][ T197] kobject: 'queues' (00000000bfa3c8ed): kobject_cleanup, parent 00000000608fd6d8 [ 341.862593][ T197] kobject: 'queues' (00000000bfa3c8ed): calling ktype release [ 341.870084][ T197] kobject: 'queues' (00000000bfa3c8ed): kset_release [ 341.876741][ T197] kobject: 'queues': free name [ 341.882097][ T197] kobject: 'gretap0' (00000000a67837ff): kobject_uevent_env [ 341.889500][ T197] kobject: 'gretap0' (00000000a67837ff): kobject_uevent_env: uevent_suppress caused the event to drop! [ 341.901274][ T197] kobject: 'batman_adv' (00000000662b62c5): kobject_uevent_env [ 341.909926][ T197] kobject: 'batman_adv' (00000000662b62c5): kobject_uevent_env: filter function caused the event to drop! [ 341.921437][ T197] kobject: 'batman_adv' (00000000662b62c5): kobject_cleanup, parent 00000000608fd6d8 [ 341.930979][ T197] kobject: 'batman_adv' (00000000662b62c5): calling ktype release [ 341.939180][ T197] kobject: (00000000662b62c5): dynamic_kobj_release [ 341.945782][ T197] kobject: 'batman_adv': free name [ 341.951477][ T197] kobject: 'rx-0' (000000006c8f0d32): kobject_cleanup, parent 000000007598ac20 [ 341.960790][ T197] kobject: 'rx-0' (000000006c8f0d32): auto cleanup 'remove' event [ 341.968726][ T197] kobject: 'rx-0' (000000006c8f0d32): kobject_uevent_env [ 341.975770][ T197] kobject: 'rx-0' (000000006c8f0d32): kobject_uevent_env: uevent_suppress caused the event to drop! [ 341.986684][ T197] kobject: 'rx-0' (000000006c8f0d32): auto cleanup kobject_del [ 341.994282][ T197] kobject: 'rx-0' (000000006c8f0d32): calling ktype release [ 342.001580][ T197] kobject: 'rx-0': free name [ 342.006205][ T197] kobject: 'tx-0' (000000005d908e06): kobject_cleanup, parent 000000007598ac20 [ 342.015166][ T197] kobject: 'tx-0' (000000005d908e06): auto cleanup 'remove' event [ 342.022983][ T197] kobject: 'tx-0' (000000005d908e06): kobject_uevent_env [ 342.030109][ T197] kobject: 'tx-0' (000000005d908e06): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.040986][ T197] kobject: 'tx-0' (000000005d908e06): auto cleanup kobject_del [ 342.048645][ T197] kobject: 'tx-0' (000000005d908e06): calling ktype release [ 342.055929][ T197] kobject: 'tx-0': free name [ 342.061112][ T197] kobject: 'queues' (000000007598ac20): kobject_cleanup, parent 00000000608fd6d8 [ 342.070286][ T197] kobject: 'queues' (000000007598ac20): calling ktype release [ 342.078731][ T197] kobject: 'queues' (000000007598ac20): kset_release [ 342.085418][ T197] kobject: 'queues': free name [ 342.091309][ T197] kobject: 'gretap0' (0000000058f2a85c): kobject_uevent_env [ 342.098854][ T197] kobject: 'gretap0' (0000000058f2a85c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.110987][ T197] kobject: 'batman_adv' (00000000e7346a50): kobject_uevent_env [ 342.118738][ T197] kobject: 'batman_adv' (00000000e7346a50): kobject_uevent_env: filter function caused the event to drop! [ 342.130142][ T197] kobject: 'batman_adv' (00000000e7346a50): kobject_cleanup, parent 00000000608fd6d8 [ 342.139755][ T197] kobject: 'batman_adv' (00000000e7346a50): calling ktype release [ 342.148074][ T197] kobject: (00000000e7346a50): dynamic_kobj_release [ 342.154706][ T197] kobject: 'batman_adv': free name [ 342.160146][ T197] kobject: 'rx-0' (000000004cd32ea3): kobject_cleanup, parent 00000000c5f04d73 [ 342.169478][ T197] kobject: 'rx-0' (000000004cd32ea3): auto cleanup 'remove' event [ 342.177338][ T197] kobject: 'rx-0' (000000004cd32ea3): kobject_uevent_env [ 342.184562][ T197] kobject: 'rx-0' (000000004cd32ea3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.195455][ T197] kobject: 'rx-0' (000000004cd32ea3): auto cleanup kobject_del [ 342.203388][ T197] kobject: 'rx-0' (000000004cd32ea3): calling ktype release [ 342.210721][ T197] kobject: 'rx-0': free name [ 342.215454][ T197] kobject: 'tx-0' (00000000febf9597): kobject_cleanup, parent 00000000c5f04d73 [ 342.224841][ T197] kobject: 'tx-0' (00000000febf9597): auto cleanup 'remove' event [ 342.232804][ T197] kobject: 'tx-0' (00000000febf9597): kobject_uevent_env [ 342.240041][ T197] kobject: 'tx-0' (00000000febf9597): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.250860][ T197] kobject: 'tx-0' (00000000febf9597): auto cleanup kobject_del [ 342.258861][ T197] kobject: 'tx-0' (00000000febf9597): calling ktype release [ 342.266185][ T197] kobject: 'tx-0': free name [ 342.270818][ T197] kobject: 'queues' (00000000c5f04d73): kobject_cleanup, parent 00000000608fd6d8 [ 342.280799][ T197] kobject: 'queues' (00000000c5f04d73): calling ktype release [ 342.288323][ T197] kobject: 'queues' (00000000c5f04d73): kset_release [ 342.295029][ T197] kobject: 'queues': free name [ 342.300428][ T197] kobject: 'gretap0' (00000000eb3f2d50): kobject_uevent_env [ 342.307725][ T197] kobject: 'gretap0' (00000000eb3f2d50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.319501][ T197] kobject: 'batman_adv' (00000000defdd1f2): kobject_uevent_env [ 342.327059][ T197] kobject: 'batman_adv' (00000000defdd1f2): kobject_uevent_env: filter function caused the event to drop! [ 342.338546][ T197] kobject: 'batman_adv' (00000000defdd1f2): kobject_cleanup, parent 00000000608fd6d8 [ 342.348345][ T197] kobject: 'batman_adv' (00000000defdd1f2): calling ktype release [ 342.356153][ T197] kobject: (00000000defdd1f2): dynamic_kobj_release [ 342.362786][ T197] kobject: 'batman_adv': free name [ 342.368070][ T197] kobject: 'rx-0' (00000000ed2c2cf5): kobject_cleanup, parent 00000000a80606cb [ 342.377002][ T197] kobject: 'rx-0' (00000000ed2c2cf5): auto cleanup 'remove' event [ 342.384840][ T197] kobject: 'rx-0' (00000000ed2c2cf5): kobject_uevent_env [ 342.393159][ T197] kobject: 'rx-0' (00000000ed2c2cf5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.403997][ T197] kobject: 'rx-0' (00000000ed2c2cf5): auto cleanup kobject_del [ 342.411653][ T197] kobject: 'rx-0' (00000000ed2c2cf5): calling ktype release [ 342.418980][ T197] kobject: 'rx-0': free name [ 342.423610][ T197] kobject: 'tx-0' (00000000b67c45ff): kobject_cleanup, parent 00000000a80606cb [ 342.432823][ T197] kobject: 'tx-0' (00000000b67c45ff): auto cleanup 'remove' event [ 342.440641][ T197] kobject: 'tx-0' (00000000b67c45ff): kobject_uevent_env [ 342.447668][ T197] kobject: 'tx-0' (00000000b67c45ff): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.458471][ T197] kobject: 'tx-0' (00000000b67c45ff): auto cleanup kobject_del [ 342.466157][ T197] kobject: 'tx-0' (00000000b67c45ff): calling ktype release [ 342.473575][ T197] kobject: 'tx-0': free name [ 342.478581][ T197] kobject: 'queues' (00000000a80606cb): kobject_cleanup, parent 00000000608fd6d8 [ 342.487931][ T197] kobject: 'queues' (00000000a80606cb): calling ktype release [ 342.495403][ T197] kobject: 'queues' (00000000a80606cb): kset_release [ 342.502627][ T197] kobject: 'queues': free name [ 342.507715][ T197] kobject: 'gretap0' (00000000e1ceae63): kobject_uevent_env [ 342.515035][ T197] kobject: 'gretap0' (00000000e1ceae63): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.526778][ T197] kobject: 'batman_adv' (00000000443662e1): kobject_uevent_env [ 342.534372][ T197] kobject: 'batman_adv' (00000000443662e1): kobject_uevent_env: filter function caused the event to drop! [ 342.545750][ T197] kobject: 'batman_adv' (00000000443662e1): kobject_cleanup, parent 00000000608fd6d8 [ 342.555377][ T197] kobject: 'batman_adv' (00000000443662e1): calling ktype release [ 342.563525][ T197] kobject: (00000000443662e1): dynamic_kobj_release [ 342.570198][ T197] kobject: 'batman_adv': free name [ 342.575439][ T197] kobject: 'rx-0' (00000000543d54ac): kobject_cleanup, parent 0000000055c8df90 [ 342.584412][ T197] kobject: 'rx-0' (00000000543d54ac): auto cleanup 'remove' event [ 342.592252][ T197] kobject: 'rx-0' (00000000543d54ac): kobject_uevent_env [ 342.599342][ T197] kobject: 'rx-0' (00000000543d54ac): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.610833][ T197] kobject: 'rx-0' (00000000543d54ac): auto cleanup kobject_del [ 342.618550][ T197] kobject: 'rx-0' (00000000543d54ac): calling ktype release [ 342.625831][ T197] kobject: 'rx-0': free name [ 342.630602][ T197] kobject: 'tx-0' (000000008af531ff): kobject_cleanup, parent 0000000055c8df90 [ 342.639883][ T197] kobject: 'tx-0' (000000008af531ff): auto cleanup 'remove' event [ 342.647771][ T197] kobject: 'tx-0' (000000008af531ff): kobject_uevent_env [ 342.654826][ T197] kobject: 'tx-0' (000000008af531ff): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.665631][ T197] kobject: 'tx-0' (000000008af531ff): auto cleanup kobject_del [ 342.673272][ T197] kobject: 'tx-0' (000000008af531ff): calling ktype release [ 342.680693][ T197] kobject: 'tx-0': free name [ 342.685301][ T197] kobject: 'queues' (0000000055c8df90): kobject_cleanup, parent 00000000608fd6d8 [ 342.694467][ T197] kobject: 'queues' (0000000055c8df90): calling ktype release [ 342.701967][ T197] kobject: 'queues' (0000000055c8df90): kset_release [ 342.708676][ T197] kobject: 'queues': free name [ 342.713764][ T197] kobject: 'gretap0' (000000005222ef7b): kobject_uevent_env [ 342.721525][ T197] kobject: 'gretap0' (000000005222ef7b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.733276][ T197] kobject: 'batman_adv' (000000004cc72233): kobject_uevent_env [ 342.741174][ T197] kobject: 'batman_adv' (000000004cc72233): kobject_uevent_env: filter function caused the event to drop! [ 342.752551][ T197] kobject: 'batman_adv' (000000004cc72233): kobject_cleanup, parent 00000000608fd6d8 [ 342.763067][ T197] kobject: 'batman_adv' (000000004cc72233): calling ktype release [ 342.770916][ T197] kobject: (000000004cc72233): dynamic_kobj_release [ 342.777686][ T197] kobject: 'batman_adv': free name [ 342.783046][ T197] kobject: 'rx-0' (000000001e1ed136): kobject_cleanup, parent 000000005e946381 [ 342.792691][ T197] kobject: 'rx-0' (000000001e1ed136): auto cleanup 'remove' event [ 342.801042][ T197] kobject: 'rx-0' (000000001e1ed136): kobject_uevent_env [ 342.808327][ T197] kobject: 'rx-0' (000000001e1ed136): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.819152][ T197] kobject: 'rx-0' (000000001e1ed136): auto cleanup kobject_del [ 342.826748][ T197] kobject: 'rx-0' (000000001e1ed136): calling ktype release [ 342.835097][ T197] kobject: 'rx-0': free name [ 342.839798][ T197] kobject: 'tx-0' (000000000ce17d6a): kobject_cleanup, parent 000000005e946381 [ 342.848787][ T197] kobject: 'tx-0' (000000000ce17d6a): auto cleanup 'remove' event [ 342.856574][ T197] kobject: 'tx-0' (000000000ce17d6a): kobject_uevent_env [ 342.863646][ T197] kobject: 'tx-0' (000000000ce17d6a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.874722][ T197] kobject: 'tx-0' (000000000ce17d6a): auto cleanup kobject_del [ 342.882380][ T197] kobject: 'tx-0' (000000000ce17d6a): calling ktype release [ 342.890665][ T197] kobject: 'tx-0': free name [ 342.895273][ T197] kobject: 'queues' (000000005e946381): kobject_cleanup, parent 00000000608fd6d8 [ 342.904421][ T197] kobject: 'queues' (000000005e946381): calling ktype release [ 342.912042][ T197] kobject: 'queues' (000000005e946381): kset_release [ 342.918917][ T197] kobject: 'queues': free name [ 342.924037][ T197] kobject: 'gretap0' (000000003725ee07): kobject_uevent_env [ 342.932964][ T197] kobject: 'gretap0' (000000003725ee07): kobject_uevent_env: uevent_suppress caused the event to drop! [ 342.945010][ T197] kobject: 'batman_adv' (000000001055a6dc): kobject_uevent_env [ 342.952692][ T197] kobject: 'batman_adv' (000000001055a6dc): kobject_uevent_env: filter function caused the event to drop! [ 342.964135][ T197] kobject: 'batman_adv' (000000001055a6dc): kobject_cleanup, parent 00000000608fd6d8 [ 342.973768][ T197] kobject: 'batman_adv' (000000001055a6dc): calling ktype release [ 342.981627][ T197] kobject: (000000001055a6dc): dynamic_kobj_release [ 342.988288][ T197] kobject: 'batman_adv': free name [ 342.993501][ T197] kobject: 'rx-0' (0000000070306980): kobject_cleanup, parent 000000008a473e4d [ 343.003038][ T197] kobject: 'rx-0' (0000000070306980): auto cleanup 'remove' event [ 343.010879][ T197] kobject: 'rx-0' (0000000070306980): kobject_uevent_env [ 343.018029][ T197] kobject: 'rx-0' (0000000070306980): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.029120][ T197] kobject: 'rx-0' (0000000070306980): auto cleanup kobject_del [ 343.036693][ T197] kobject: 'rx-0' (0000000070306980): calling ktype release [ 343.044042][ T197] kobject: 'rx-0': free name [ 343.052544][ T197] kobject: 'tx-0' (00000000b775942d): kobject_cleanup, parent 000000008a473e4d [ 343.061529][ T197] kobject: 'tx-0' (00000000b775942d): auto cleanup 'remove' event [ 343.069399][ T197] kobject: 'tx-0' (00000000b775942d): kobject_uevent_env [ 343.076417][ T197] kobject: 'tx-0' (00000000b775942d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.087754][ T197] kobject: 'tx-0' (00000000b775942d): auto cleanup kobject_del [ 343.095469][ T197] kobject: 'tx-0' (00000000b775942d): calling ktype release [ 343.102770][ T197] kobject: 'tx-0': free name [ 343.107390][ T197] kobject: 'queues' (000000008a473e4d): kobject_cleanup, parent 00000000608fd6d8 [ 343.116681][ T197] kobject: 'queues' (000000008a473e4d): calling ktype release [ 343.124171][ T197] kobject: 'queues' (000000008a473e4d): kset_release [ 343.131151][ T197] kobject: 'queues': free name [ 343.136258][ T197] kobject: 'gretap0' (0000000096d9d74c): kobject_uevent_env [ 343.143603][ T197] kobject: 'gretap0' (0000000096d9d74c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.155276][ T197] kobject: 'batman_adv' (00000000f4126c71): kobject_uevent_env [ 343.163273][ T197] kobject: 'batman_adv' (00000000f4126c71): kobject_uevent_env: filter function caused the event to drop! [ 343.174628][ T197] kobject: 'batman_adv' (00000000f4126c71): kobject_cleanup, parent 00000000608fd6d8 [ 343.184246][ T197] kobject: 'batman_adv' (00000000f4126c71): calling ktype release [ 343.192363][ T197] kobject: (00000000f4126c71): dynamic_kobj_release [ 343.199051][ T197] kobject: 'batman_adv': free name [ 343.204282][ T197] kobject: 'rx-0' (00000000ea5db5df): kobject_cleanup, parent 000000008c01157a [ 343.213250][ T197] kobject: 'rx-0' (00000000ea5db5df): auto cleanup 'remove' event [ 343.221263][ T197] kobject: 'rx-0' (00000000ea5db5df): kobject_uevent_env [ 343.228343][ T197] kobject: 'rx-0' (00000000ea5db5df): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.239207][ T197] kobject: 'rx-0' (00000000ea5db5df): auto cleanup kobject_del [ 343.246789][ T197] kobject: 'rx-0' (00000000ea5db5df): calling ktype release [ 343.254428][ T197] kobject: 'rx-0': free name [ 343.259674][ T197] kobject: 'tx-0' (00000000d5d3df78): kobject_cleanup, parent 000000008c01157a [ 343.269135][ T197] kobject: 'tx-0' (00000000d5d3df78): auto cleanup 'remove' event [ 343.276937][ T197] kobject: 'tx-0' (00000000d5d3df78): kobject_uevent_env [ 343.284120][ T197] kobject: 'tx-0' (00000000d5d3df78): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.296103][ T197] kobject: 'tx-0' (00000000d5d3df78): auto cleanup kobject_del [ 343.304476][ T197] kobject: 'tx-0' (00000000d5d3df78): calling ktype release [ 343.312751][ T4108] kobject: 'loop4' (000000001ca20e6b): kobject_uevent_env [ 343.320126][ T197] kobject: 'tx-0': free name [ 343.323211][ T4108] kobject: 'loop4' (000000001ca20e6b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 343.324749][ T197] kobject: 'queues' (000000008c01157a): kobject_cleanup, parent 00000000608fd6d8 [ 343.344072][ T197] kobject: 'queues' (000000008c01157a): calling ktype release [ 343.351592][ T197] kobject: 'queues' (000000008c01157a): kset_release [ 343.358310][ T197] kobject: 'queues': free name [ 343.363665][ T197] kobject: 'gretap0' (00000000991042ac): kobject_uevent_env [ 343.370982][ T197] kobject: 'gretap0' (00000000991042ac): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.383406][ T197] kobject: 'batman_adv' (00000000f4e16196): kobject_uevent_env [ 343.391586][ T197] kobject: 'batman_adv' (00000000f4e16196): kobject_uevent_env: filter function caused the event to drop! [ 343.402962][ T197] kobject: 'batman_adv' (00000000f4e16196): kobject_cleanup, parent 00000000608fd6d8 [ 343.412762][ T197] kobject: 'batman_adv' (00000000f4e16196): calling ktype release [ 343.420717][ T197] kobject: (00000000f4e16196): dynamic_kobj_release [ 343.427303][ T197] kobject: 'batman_adv': free name [ 343.432674][ T197] kobject: 'rx-0' (00000000cfd389c0): kobject_cleanup, parent 000000009ba63edf [ 343.441640][ T197] kobject: 'rx-0' (00000000cfd389c0): auto cleanup 'remove' event [ 343.449466][ T197] kobject: 'rx-0' (00000000cfd389c0): kobject_uevent_env [ 343.456498][ T197] kobject: 'rx-0' (00000000cfd389c0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.467328][ T197] kobject: 'rx-0' (00000000cfd389c0): auto cleanup kobject_del [ 343.474934][ T197] kobject: 'rx-0' (00000000cfd389c0): calling ktype release [ 343.482431][ T197] kobject: 'rx-0': free name [ 343.487060][ T197] kobject: 'tx-0' (000000008d72464a): kobject_cleanup, parent 000000009ba63edf [ 343.496432][ T197] kobject: 'tx-0' (000000008d72464a): auto cleanup 'remove' event [ 343.504442][ T197] kobject: 'tx-0' (000000008d72464a): kobject_uevent_env [ 343.511516][ T197] kobject: 'tx-0' (000000008d72464a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.522595][ T197] kobject: 'tx-0' (000000008d72464a): auto cleanup kobject_del [ 343.530236][ T197] kobject: 'tx-0' (000000008d72464a): calling ktype release [ 343.541578][ T197] kobject: 'tx-0': free name [ 343.546183][ T197] kobject: 'queues' (000000009ba63edf): kobject_cleanup, parent 00000000608fd6d8 [ 343.555297][ T197] kobject: 'queues' (000000009ba63edf): calling ktype release [ 343.562826][ T197] kobject: 'queues' (000000009ba63edf): kset_release [ 343.569542][ T197] kobject: 'queues': free name [ 343.574637][ T197] kobject: 'gretap0' (0000000063eb8757): kobject_uevent_env [ 343.581944][ T197] kobject: 'gretap0' (0000000063eb8757): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.593668][ T197] kobject: 'batman_adv' (00000000ecc0c610): kobject_uevent_env [ 343.601711][ T197] kobject: 'batman_adv' (00000000ecc0c610): kobject_uevent_env: filter function caused the event to drop! [ 343.613075][ T197] kobject: 'batman_adv' (00000000ecc0c610): kobject_cleanup, parent 00000000608fd6d8 [ 343.622570][ T197] kobject: 'batman_adv' (00000000ecc0c610): calling ktype release [ 343.630401][ T197] kobject: (00000000ecc0c610): dynamic_kobj_release [ 343.637008][ T197] kobject: 'batman_adv': free name [ 343.642352][ T197] kobject: 'rx-0' (0000000060684f53): kobject_cleanup, parent 00000000f47db339 [ 343.651490][ T197] kobject: 'rx-0' (0000000060684f53): auto cleanup 'remove' event [ 343.659332][ T197] kobject: 'rx-0' (0000000060684f53): kobject_uevent_env [ 343.666983][ T197] kobject: 'rx-0' (0000000060684f53): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.677898][ T197] kobject: 'rx-0' (0000000060684f53): auto cleanup kobject_del [ 343.685473][ T197] kobject: 'rx-0' (0000000060684f53): calling ktype release [ 343.692813][ T197] kobject: 'rx-0': free name [ 343.698540][ T197] kobject: 'tx-0' (000000005b170c5e): kobject_cleanup, parent 00000000f47db339 [ 343.707460][ T197] kobject: 'tx-0' (000000005b170c5e): auto cleanup 'remove' event [ 343.715723][ T197] kobject: 'tx-0' (000000005b170c5e): kobject_uevent_env [ 343.722820][ T197] kobject: 'tx-0' (000000005b170c5e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.733722][ T197] kobject: 'tx-0' (000000005b170c5e): auto cleanup kobject_del [ 343.741340][ T197] kobject: 'tx-0' (000000005b170c5e): calling ktype release [ 343.748667][ T197] kobject: 'tx-0': free name [ 343.753264][ T197] kobject: 'queues' (00000000f47db339): kobject_cleanup, parent 00000000608fd6d8 [ 343.762404][ T197] kobject: 'queues' (00000000f47db339): calling ktype release [ 343.769879][ T197] kobject: 'queues' (00000000f47db339): kset_release [ 343.776641][ T197] kobject: 'queues': free name [ 343.782438][ T197] kobject: 'gretap0' (00000000bfc5c650): kobject_uevent_env [ 343.789806][ T197] kobject: 'gretap0' (00000000bfc5c650): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.801529][ T197] kobject: 'batman_adv' (00000000983530ca): kobject_uevent_env [ 343.809282][ T197] kobject: 'batman_adv' (00000000983530ca): kobject_uevent_env: filter function caused the event to drop! [ 343.821363][ T197] kobject: 'batman_adv' (00000000983530ca): kobject_cleanup, parent 00000000608fd6d8 [ 343.830909][ T197] kobject: 'batman_adv' (00000000983530ca): calling ktype release [ 343.838889][ T197] kobject: (00000000983530ca): dynamic_kobj_release [ 343.845507][ T197] kobject: 'batman_adv': free name [ 343.851069][ T197] kobject: 'rx-0' (0000000046b6a51b): kobject_cleanup, parent 000000007b9f8cf5 [ 343.860041][ T197] kobject: 'rx-0' (0000000046b6a51b): auto cleanup 'remove' event [ 343.867874][ T197] kobject: 'rx-0' (0000000046b6a51b): kobject_uevent_env [ 343.874902][ T197] kobject: 'rx-0' (0000000046b6a51b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.886002][ T197] kobject: 'rx-0' (0000000046b6a51b): auto cleanup kobject_del [ 343.893624][ T197] kobject: 'rx-0' (0000000046b6a51b): calling ktype release [ 343.900929][ T197] kobject: 'rx-0': free name [ 343.905554][ T197] kobject: 'tx-0' (00000000440da62c): kobject_cleanup, parent 000000007b9f8cf5 [ 343.914799][ T197] kobject: 'tx-0' (00000000440da62c): auto cleanup 'remove' event [ 343.922818][ T197] kobject: 'tx-0' (00000000440da62c): kobject_uevent_env [ 343.930462][ T197] kobject: 'tx-0' (00000000440da62c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 343.941277][ T197] kobject: 'tx-0' (00000000440da62c): auto cleanup kobject_del [ 343.948884][ T197] kobject: 'tx-0' (00000000440da62c): calling ktype release [ 343.956144][ T197] kobject: 'tx-0': free name [ 343.962065][ T197] kobject: 'queues' (000000007b9f8cf5): kobject_cleanup, parent 00000000608fd6d8 [ 343.971203][ T197] kobject: 'queues' (000000007b9f8cf5): calling ktype release [ 343.978689][ T197] kobject: 'queues' (000000007b9f8cf5): kset_release [ 343.985362][ T197] kobject: 'queues': free name [ 343.990590][ T197] kobject: 'gretap0' (000000000b21e607): kobject_uevent_env [ 343.998278][ T197] kobject: 'gretap0' (000000000b21e607): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.009908][ T197] kobject: 'batman_adv' (000000005c8fd18a): kobject_uevent_env [ 344.017504][ T197] kobject: 'batman_adv' (000000005c8fd18a): kobject_uevent_env: filter function caused the event to drop! [ 344.029243][ T197] kobject: 'batman_adv' (000000005c8fd18a): kobject_cleanup, parent 00000000608fd6d8 [ 344.039241][ T197] kobject: 'batman_adv' (000000005c8fd18a): calling ktype release [ 344.047062][ T197] kobject: (000000005c8fd18a): dynamic_kobj_release [ 344.053963][ T197] kobject: 'batman_adv': free name [ 344.059274][ T197] kobject: 'rx-0' (000000003e80c2a3): kobject_cleanup, parent 00000000433c4fb7 [ 344.068350][ T197] kobject: 'rx-0' (000000003e80c2a3): auto cleanup 'remove' event [ 344.076128][ T197] kobject: 'rx-0' (000000003e80c2a3): kobject_uevent_env [ 344.083171][ T197] kobject: 'rx-0' (000000003e80c2a3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.093971][ T197] kobject: 'rx-0' (000000003e80c2a3): auto cleanup kobject_del [ 344.101577][ T197] kobject: 'rx-0' (000000003e80c2a3): calling ktype release [ 344.109100][ T197] kobject: 'rx-0': free name [ 344.113711][ T197] kobject: 'tx-0' (00000000af1e7920): kobject_cleanup, parent 00000000433c4fb7 [ 344.122755][ T197] kobject: 'tx-0' (00000000af1e7920): auto cleanup 'remove' event [ 344.130634][ T197] kobject: 'tx-0' (00000000af1e7920): kobject_uevent_env [ 344.137648][ T197] kobject: 'tx-0' (00000000af1e7920): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.148866][ T197] kobject: 'tx-0' (00000000af1e7920): auto cleanup kobject_del [ 344.156448][ T197] kobject: 'tx-0' (00000000af1e7920): calling ktype release [ 344.163756][ T197] kobject: 'tx-0': free name [ 344.168408][ T197] kobject: 'queues' (00000000433c4fb7): kobject_cleanup, parent 00000000608fd6d8 [ 344.177487][ T197] kobject: 'queues' (00000000433c4fb7): calling ktype release [ 344.185252][ T197] kobject: 'queues' (00000000433c4fb7): kset_release [ 344.191972][ T197] kobject: 'queues': free name [ 344.197053][ T197] kobject: 'gretap0' (00000000c8aa64c0): kobject_uevent_env [ 344.204369][ T197] kobject: 'gretap0' (00000000c8aa64c0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.215999][ T197] kobject: 'batman_adv' (000000002f915bd6): kobject_uevent_env [ 344.223575][ T197] kobject: 'batman_adv' (000000002f915bd6): kobject_uevent_env: filter function caused the event to drop! [ 344.234901][ T197] kobject: 'batman_adv' (000000002f915bd6): kobject_cleanup, parent 00000000608fd6d8 [ 344.244550][ T197] kobject: 'batman_adv' (000000002f915bd6): calling ktype release [ 344.252430][ T197] kobject: (000000002f915bd6): dynamic_kobj_release [ 344.260000][ T197] kobject: 'batman_adv': free name [ 344.265346][ T197] kobject: 'rx-0' (000000009e99fe09): kobject_cleanup, parent 0000000082c51812 [ 344.274328][ T197] kobject: 'rx-0' (000000009e99fe09): auto cleanup 'remove' event [ 344.282431][ T197] kobject: 'rx-0' (000000009e99fe09): kobject_uevent_env [ 344.289512][ T197] kobject: 'rx-0' (000000009e99fe09): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.300327][ T197] kobject: 'rx-0' (000000009e99fe09): auto cleanup kobject_del [ 344.307931][ T197] kobject: 'rx-0' (000000009e99fe09): calling ktype release [ 344.315225][ T197] kobject: 'rx-0': free name [ 344.319893][ T197] kobject: 'tx-0' (000000003804ad13): kobject_cleanup, parent 0000000082c51812 [ 344.328834][ T197] kobject: 'tx-0' (000000003804ad13): auto cleanup 'remove' event [ 344.336622][ T197] kobject: 'tx-0' (000000003804ad13): kobject_uevent_env [ 344.343746][ T197] kobject: 'tx-0' (000000003804ad13): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.354772][ T197] kobject: 'tx-0' (000000003804ad13): auto cleanup kobject_del [ 344.362758][ T197] kobject: 'tx-0' (000000003804ad13): calling ktype release [ 344.370529][ T197] kobject: 'tx-0': free name [ 344.375128][ T197] kobject: 'queues' (0000000082c51812): kobject_cleanup, parent 00000000608fd6d8 [ 344.384309][ T197] kobject: 'queues' (0000000082c51812): calling ktype release [ 344.391831][ T197] kobject: 'queues' (0000000082c51812): kset_release [ 344.398542][ T197] kobject: 'queues': free name [ 344.403621][ T197] kobject: 'gretap0' (000000001dda7673): kobject_uevent_env [ 344.410961][ T197] kobject: 'gretap0' (000000001dda7673): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.422606][ T197] kobject: 'batman_adv' (00000000cfc6cd34): kobject_uevent_env [ 344.430213][ T197] kobject: 'batman_adv' (00000000cfc6cd34): kobject_uevent_env: filter function caused the event to drop! [ 344.441538][ T197] kobject: 'batman_adv' (00000000cfc6cd34): kobject_cleanup, parent 00000000608fd6d8 [ 344.451406][ T197] kobject: 'batman_adv' (00000000cfc6cd34): calling ktype release [ 344.459241][ T197] kobject: (00000000cfc6cd34): dynamic_kobj_release [ 344.465823][ T197] kobject: 'batman_adv': free name [ 344.471133][ T197] kobject: 'rx-0' (00000000f3d8f75c): kobject_cleanup, parent 00000000059ac4c6 [ 344.480542][ T197] kobject: 'rx-0' (00000000f3d8f75c): auto cleanup 'remove' event [ 344.488389][ T197] kobject: 'rx-0' (00000000f3d8f75c): kobject_uevent_env [ 344.495415][ T197] kobject: 'rx-0' (00000000f3d8f75c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.506325][ T197] kobject: 'rx-0' (00000000f3d8f75c): auto cleanup kobject_del [ 344.513945][ T197] kobject: 'rx-0' (00000000f3d8f75c): calling ktype release [ 344.521275][ T197] kobject: 'rx-0': free name [ 344.525916][ T197] kobject: 'tx-0' (00000000af070c41): kobject_cleanup, parent 00000000059ac4c6 [ 344.534864][ T197] kobject: 'tx-0' (00000000af070c41): auto cleanup 'remove' event [ 344.542677][ T197] kobject: 'tx-0' (00000000af070c41): kobject_uevent_env [ 344.549727][ T197] kobject: 'tx-0' (00000000af070c41): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.560686][ T197] kobject: 'tx-0' (00000000af070c41): auto cleanup kobject_del [ 344.568305][ T197] kobject: 'tx-0' (00000000af070c41): calling ktype release [ 344.575585][ T197] kobject: 'tx-0': free name [ 344.580278][ T197] kobject: 'queues' (00000000059ac4c6): kobject_cleanup, parent 00000000608fd6d8 [ 344.590015][ T197] kobject: 'queues' (00000000059ac4c6): calling ktype release [ 344.597576][ T197] kobject: 'queues' (00000000059ac4c6): kset_release [ 344.604323][ T197] kobject: 'queues': free name [ 344.609470][ T197] kobject: 'gretap0' (00000000b6e9b69f): kobject_uevent_env [ 344.616752][ T197] kobject: 'gretap0' (00000000b6e9b69f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.629769][ T197] kobject: 'batman_adv' (0000000044a65aa9): kobject_uevent_env [ 344.637350][ T197] kobject: 'batman_adv' (0000000044a65aa9): kobject_uevent_env: filter function caused the event to drop! [ 344.648896][ T197] kobject: 'batman_adv' (0000000044a65aa9): kobject_cleanup, parent 00000000608fd6d8 [ 344.658720][ T197] kobject: 'batman_adv' (0000000044a65aa9): calling ktype release [ 344.666522][ T197] kobject: (0000000044a65aa9): dynamic_kobj_release [ 344.673166][ T197] kobject: 'batman_adv': free name [ 344.679037][ T197] kobject: 'rx-0' (0000000019cef04f): kobject_cleanup, parent 000000007c5b4a98 [ 344.688045][ T197] kobject: 'rx-0' (0000000019cef04f): auto cleanup 'remove' event [ 344.695848][ T197] kobject: 'rx-0' (0000000019cef04f): kobject_uevent_env [ 344.703388][ T197] kobject: 'rx-0' (0000000019cef04f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.714292][ T197] kobject: 'rx-0' (0000000019cef04f): auto cleanup kobject_del [ 344.721957][ T197] kobject: 'rx-0' (0000000019cef04f): calling ktype release [ 344.729255][ T197] kobject: 'rx-0': free name [ 344.733885][ T197] kobject: 'tx-0' (0000000007e63009): kobject_cleanup, parent 000000007c5b4a98 [ 344.742901][ T197] kobject: 'tx-0' (0000000007e63009): auto cleanup 'remove' event [ 344.750730][ T197] kobject: 'tx-0' (0000000007e63009): kobject_uevent_env [ 344.757734][ T197] kobject: 'tx-0' (0000000007e63009): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.769294][ T197] kobject: 'tx-0' (0000000007e63009): auto cleanup kobject_del [ 344.776894][ T197] kobject: 'tx-0' (0000000007e63009): calling ktype release [ 344.784215][ T197] kobject: 'tx-0': free name [ 344.788846][ T197] kobject: 'queues' (000000007c5b4a98): kobject_cleanup, parent 00000000608fd6d8 [ 344.797986][ T197] kobject: 'queues' (000000007c5b4a98): calling ktype release [ 344.805458][ T197] kobject: 'queues' (000000007c5b4a98): kset_release [ 344.812826][ T197] kobject: 'queues': free name [ 344.818037][ T197] kobject: 'gretap0' (000000005953d1b4): kobject_uevent_env [ 344.825331][ T197] kobject: 'gretap0' (000000005953d1b4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.837065][ T197] kobject: 'batman_adv' (000000005af1256b): kobject_uevent_env [ 344.844651][ T197] kobject: 'batman_adv' (000000005af1256b): kobject_uevent_env: filter function caused the event to drop! [ 344.856031][ T197] kobject: 'batman_adv' (000000005af1256b): kobject_cleanup, parent 00000000608fd6d8 [ 344.866031][ T197] kobject: 'batman_adv' (000000005af1256b): calling ktype release [ 344.874017][ T197] kobject: (000000005af1256b): dynamic_kobj_release [ 344.880733][ T197] kobject: 'batman_adv': free name [ 344.886016][ T197] kobject: 'rx-0' (0000000062bb2460): kobject_cleanup, parent 000000004c719237 [ 344.894959][ T197] kobject: 'rx-0' (0000000062bb2460): auto cleanup 'remove' event [ 344.902775][ T197] kobject: 'rx-0' (0000000062bb2460): kobject_uevent_env [ 344.909834][ T197] kobject: 'rx-0' (0000000062bb2460): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.920974][ T197] kobject: 'rx-0' (0000000062bb2460): auto cleanup kobject_del [ 344.928622][ T197] kobject: 'rx-0' (0000000062bb2460): calling ktype release [ 344.935943][ T197] kobject: 'rx-0': free name [ 344.940931][ T197] kobject: 'tx-0' (00000000d6a7f950): kobject_cleanup, parent 000000004c719237 [ 344.950087][ T197] kobject: 'tx-0' (00000000d6a7f950): auto cleanup 'remove' event [ 344.957924][ T197] kobject: 'tx-0' (00000000d6a7f950): kobject_uevent_env [ 344.965006][ T197] kobject: 'tx-0' (00000000d6a7f950): kobject_uevent_env: uevent_suppress caused the event to drop! [ 344.975796][ T197] kobject: 'tx-0' (00000000d6a7f950): auto cleanup kobject_del [ 344.983390][ T197] kobject: 'tx-0' (00000000d6a7f950): calling ktype release [ 344.990723][ T197] kobject: 'tx-0': free name [ 344.995316][ T197] kobject: 'queues' (000000004c719237): kobject_cleanup, parent 00000000608fd6d8 [ 345.004664][ T197] kobject: 'queues' (000000004c719237): calling ktype release [ 345.012157][ T197] kobject: 'queues' (000000004c719237): kset_release [ 345.018865][ T197] kobject: 'queues': free name [ 345.023945][ T197] kobject: 'gretap0' (000000002db85c1d): kobject_uevent_env [ 345.031732][ T197] kobject: 'gretap0' (000000002db85c1d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 345.043332][ T197] kobject: 'batman_adv' (000000007549b594): kobject_uevent_env [ 345.050949][ T197] kobject: 'batman_adv' (000000007549b594): kobject_uevent_env: filter function caused the event to drop! [ 345.062308][ T197] kobject: 'batman_adv' (000000007549b594): kobject_cleanup, parent 00000000608fd6d8 [ 345.071980][ T197] kobject: 'batman_adv' (000000007549b594): calling ktype release [ 345.079944][ T197] kobject: (000000007549b594): dynamic_kobj_release [ 345.086521][ T197] kobject: 'batman_adv': free name [ 345.091809][ T197] kobject: 'rx-0' (00000000ee2297ca): kobject_cleanup, parent 00000000c4f035a6 [ 345.100754][ T197] kobject: 'rx-0' (00000000ee2297ca): auto cleanup 'remove' event [ 345.108570][ T197] kobject: 'rx-0' (00000000ee2297ca): kobject_uevent_env [ 345.115587][ T197] kobject: 'rx-0' (00000000ee2297ca): kobject_uevent_env: uevent_suppress caused the event to drop! [ 345.126380][ T197] kobject: 'rx-0' (00000000ee2297ca): auto cleanup kobject_del [ 345.133986][ T197] kobject: 'rx-0' (00000000ee2297ca): calling ktype release [ 345.141769][ T197] kobject: 'rx-0': free name [ 345.146396][ T197] kobject: 'tx-0' (000000003ef9cab3): kobject_cleanup, parent 00000000c4f035a6 [ 345.155356][ T197] kobject: 'tx-0' (000000003ef9cab3): auto cleanup 'remove' event [ 345.163234][ T197] kobject: 'tx-0' (000000003ef9cab3): kobject_uevent_env [ 345.170279][ T197] kobject: 'tx-0' (000000003ef9cab3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 345.181056][ T197] kobject: 'tx-0' (000000003ef9cab3): auto cleanup kobject_del [ 345.188671][ T197] kobject: 'tx-0' (000000003ef9cab3): calling ktype release [ 345.195941][ T197] kobject: 'tx-0': free name [ 345.200832][ T197] kobject: 'queues' (00000000c4f035a6): kobject_cleanup, parent 00000000608fd6d8 [ 345.209958][ T197] kobject: 'queues' (00000000c4f035a6): calling ktype release [ 345.217438][ T197] kobject: 'queues' (00000000c4f035a6): kset_release [ 345.224129][ T197] kobject: 'queues': free name [ 345.229228][ T197] kobject: 'gretap0' (00000000035a2804): kobject_uevent_env [ 345.236512][ T197] kobject: 'gretap0' (00000000035a2804): kobject_uevent_env: uevent_suppress caused the event to drop! [ 345.248828][T11129] kobject: 'rx-0' (00000000604e2b07): kobject_cleanup, parent 000000001bb78da9 [ 345.257911][T11129] kobject: 'rx-0' (00000000604e2b07): auto cleanup 'remove' event [ 345.265717][T11129] kobject: 'rx-0' (00000000604e2b07): kobject_uevent_env [ 345.272802][T11129] kobject: 'rx-0' (00000000604e2b07): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 345.284099][T11129] kobject: 'rx-0' (00000000604e2b07): auto cleanup kobject_del [ 345.292436][T11129] kobject: 'rx-0' (00000000604e2b07): calling ktype release [ 345.299990][T11129] kobject: 'rx-0': free name [ 345.304672][T11129] kobject: 'tx-0' (00000000f8c147ac): kobject_cleanup, parent 000000001bb78da9 [ 345.313653][T11129] kobject: 'tx-0' (00000000f8c147ac): auto cleanup 'remove' event [ 345.321496][T11129] kobject: 'tx-0' (00000000f8c147ac): kobject_uevent_env [ 345.328631][T11129] kobject: 'tx-0' (00000000f8c147ac): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 345.339909][T11129] kobject: 'tx-0' (00000000f8c147ac): auto cleanup kobject_del [ 345.347520][T11129] kobject: 'tx-0' (00000000f8c147ac): calling ktype release [ 345.354874][T11129] kobject: 'tx-0': free name [ 345.359528][T11129] kobject: 'queues' (000000001bb78da9): kobject_cleanup, parent 00000000608fd6d8 [ 345.368732][T11129] kobject: 'queues' (000000001bb78da9): calling ktype release [ 345.376182][T11129] kobject: 'queues' (000000001bb78da9): kset_release [ 345.382898][T11129] kobject: 'queues': free name [ 345.388305][T11129] kobject: 'ip6_vti0' (00000000970cd56e): kobject_uevent_env [ 345.395698][T11129] kobject: 'ip6_vti0' (00000000970cd56e): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 345.408603][T11109] kobject: 'gretap0' (000000009e86f487): kobject_cleanup, parent 00000000608fd6d8 [ 345.417812][T11109] kobject: 'gretap0' (000000009e86f487): calling ktype release [ 345.425506][T11109] kobject: 'gretap0': free name [ 345.430950][T11109] kobject: 'rx-0' (000000005bf743d1): kobject_cleanup, parent 00000000da916f04 [ 345.440224][T11109] kobject: 'rx-0' (000000005bf743d1): auto cleanup 'remove' event [ 345.448085][T11109] kobject: 'rx-0' (000000005bf743d1): kobject_uevent_env [ 345.455128][T11109] kobject: 'rx-0' (000000005bf743d1): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 345.466770][T11109] kobject: 'rx-0' (000000005bf743d1): auto cleanup kobject_del [ 345.474453][T11109] kobject: 'rx-0' (000000005bf743d1): calling ktype release [ 345.481833][T11109] kobject: 'rx-0': free name [ 345.486472][T11109] kobject: 'tx-0' (0000000059ab8238): kobject_cleanup, parent 00000000da916f04 [ 345.495448][T11109] kobject: 'tx-0' (0000000059ab8238): auto cleanup 'remove' event [ 345.503331][T11109] kobject: 'tx-0' (0000000059ab8238): kobject_uevent_env [ 345.511257][T11109] kobject: 'tx-0' (0000000059ab8238): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 345.522308][T11109] kobject: 'tx-0' (0000000059ab8238): auto cleanup kobject_del [ 345.529984][T11109] kobject: 'tx-0' (0000000059ab8238): calling ktype release [ 345.537256][T11109] kobject: 'tx-0': free name [ 345.541939][T11109] kobject: 'queues' (00000000da916f04): kobject_cleanup, parent 00000000608fd6d8 [ 345.551112][T11109] kobject: 'queues' (00000000da916f04): calling ktype release [ 345.559293][T11109] kobject: 'queues' (00000000da916f04): kset_release [ 345.566131][T11109] kobject: 'queues': free name [ 345.571397][T11109] kobject: 'gre0' (000000006ca29c56): kobject_uevent_env [ 345.578476][T11109] kobject: 'gre0' (000000006ca29c56): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 345.588596][ T197] kobject: 'gretap0' (00000000a67837ff): kobject_cleanup, parent 00000000608fd6d8 [ 345.597787][ T197] kobject: 'gretap0' (00000000a67837ff): calling ktype release [ 345.606034][ T197] kobject: 'gretap0': free name [ 345.657969][T11129] kobject: 'ip6_vti0' (00000000970cd56e): kobject_cleanup, parent 00000000608fd6d8 [ 345.667289][T11129] kobject: 'ip6_vti0' (00000000970cd56e): calling ktype release [ 345.675168][T11129] kobject: 'ip6_vti0': free name [ 345.680769][T11129] kobject: 'rx-0' (0000000094ce8d9e): kobject_cleanup, parent 000000004c70b2ac [ 345.689783][T11129] kobject: 'rx-0' (0000000094ce8d9e): auto cleanup 'remove' event [ 345.697594][T11129] kobject: 'rx-0' (0000000094ce8d9e): kobject_uevent_env [ 345.704688][T11129] kobject: 'rx-0' (0000000094ce8d9e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 345.715903][T11129] kobject: 'rx-0' (0000000094ce8d9e): auto cleanup kobject_del [ 345.723523][T11129] kobject: 'rx-0' (0000000094ce8d9e): calling ktype release [ 345.731763][T11129] kobject: 'rx-0': free name [ 345.736380][T11129] kobject: 'tx-0' (00000000e9ac04c6): kobject_cleanup, parent 000000004c70b2ac [ 345.745502][T11129] kobject: 'tx-0' (00000000e9ac04c6): auto cleanup 'remove' event [ 345.753523][T11129] kobject: 'tx-0' (00000000e9ac04c6): kobject_uevent_env [ 345.760630][T11129] kobject: 'tx-0' (00000000e9ac04c6): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 345.771814][T11129] kobject: 'tx-0' (00000000e9ac04c6): auto cleanup kobject_del [ 345.779471][T11129] kobject: 'tx-0' (00000000e9ac04c6): calling ktype release [ 345.786747][T11129] kobject: 'tx-0': free name [ 345.791422][T11129] kobject: 'queues' (000000004c70b2ac): kobject_cleanup, parent 00000000608fd6d8 [ 345.800701][T11129] kobject: 'queues' (000000004c70b2ac): calling ktype release [ 345.808206][T11129] kobject: 'queues' (000000004c70b2ac): kset_release [ 345.814900][T11129] kobject: 'queues': free name [ 345.820218][T11129] kobject: 'ip_vti0' (00000000c4ec5198): kobject_uevent_env [ 345.827516][T11129] kobject: 'ip_vti0' (00000000c4ec5198): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 345.839232][T11109] kobject: 'gre0' (000000006ca29c56): kobject_cleanup, parent 00000000608fd6d8 [ 345.841238][ T197] kobject: 'gretap0' (0000000058f2a85c): kobject_cleanup, parent 00000000608fd6d8 [ 345.848352][T11109] kobject: 'gre0' (000000006ca29c56): calling ktype release [ 345.857655][ T197] kobject: 'gretap0' (0000000058f2a85c): calling ktype release [ 345.864823][T11109] kobject: 'gre0': free name [ 345.877408][ T197] kobject: 'gretap0': free name [ 345.877704][T11109] kobject: 'rx-0' (000000002362df58): kobject_cleanup, parent 00000000f5492a2b [ 345.891385][T11109] kobject: 'rx-0' (000000002362df58): auto cleanup 'remove' event [ 345.899297][T11109] kobject: 'rx-0' (000000002362df58): kobject_uevent_env [ 345.906341][T11109] kobject: 'rx-0' (000000002362df58): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 345.917411][T11109] kobject: 'rx-0' (000000002362df58): auto cleanup kobject_del [ 345.925005][T11109] kobject: 'rx-0' (000000002362df58): calling ktype release [ 345.932301][T11109] kobject: 'rx-0': free name [ 345.936925][T11109] kobject: 'tx-0' (00000000b0657302): kobject_cleanup, parent 00000000f5492a2b [ 345.945890][T11109] kobject: 'tx-0' (00000000b0657302): auto cleanup 'remove' event [ 345.954523][T11109] kobject: 'tx-0' (00000000b0657302): kobject_uevent_env [ 345.961667][T11109] kobject: 'tx-0' (00000000b0657302): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 345.972774][T11109] kobject: 'tx-0' (00000000b0657302): auto cleanup kobject_del [ 345.980409][T11109] kobject: 'tx-0' (00000000b0657302): calling ktype release [ 345.987697][T11109] kobject: 'tx-0': free name [ 345.992375][T11109] kobject: 'queues' (00000000f5492a2b): kobject_cleanup, parent 00000000608fd6d8 [ 346.001499][T11109] kobject: 'queues' (00000000f5492a2b): calling ktype release [ 346.008970][T11109] kobject: 'queues' (00000000f5492a2b): kset_release [ 346.015679][T11109] kobject: 'queues': free name [ 346.020936][T11109] kobject: 'tunl0' (000000002816ff42): kobject_uevent_env [ 346.028113][T11109] kobject: 'tunl0' (000000002816ff42): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 346.157973][T11129] kobject: 'ip_vti0' (00000000c4ec5198): kobject_cleanup, parent 00000000608fd6d8 [ 346.160304][ T197] kobject: 'gretap0' (00000000eb3f2d50): kobject_cleanup, parent 00000000608fd6d8 [ 346.168775][T11129] kobject: 'ip_vti0' (00000000c4ec5198): calling ktype release [ 346.177503][ T197] kobject: 'gretap0' (00000000eb3f2d50): calling ktype release [ 346.184811][T11129] kobject: 'ip_vti0': free name [ 346.193872][ T197] kobject: 'gretap0': free name [ 346.202014][T11129] kobject: 'batman_adv' (00000000153993a4): kobject_uevent_env [ 346.209718][T11129] kobject: 'batman_adv' (00000000153993a4): kobject_uevent_env: filter function caused the event to drop! [ 346.221134][T11129] kobject: 'batman_adv' (00000000153993a4): kobject_cleanup, parent 00000000608fd6d8 [ 346.235828][T11129] kobject: 'batman_adv' (00000000153993a4): calling ktype release [ 346.243668][T11129] kobject: (00000000153993a4): dynamic_kobj_release [ 346.250311][T11129] kobject: 'batman_adv': free name [ 346.255564][T11129] kobject: 'rx-0' (00000000536b2980): kobject_cleanup, parent 000000009079f76f [ 346.264721][T11129] kobject: 'rx-0' (00000000536b2980): auto cleanup 'remove' event [ 346.272560][T11129] kobject: 'rx-0' (00000000536b2980): kobject_uevent_env [ 346.279751][T11129] kobject: 'rx-0' (00000000536b2980): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 346.291370][T11129] kobject: 'rx-0' (00000000536b2980): auto cleanup kobject_del [ 346.299010][T11129] kobject: 'rx-0' (00000000536b2980): calling ktype release [ 346.306277][T11129] kobject: 'rx-0': free name [ 346.310951][T11129] kobject: 'tx-0' (000000008d5cbd13): kobject_cleanup, parent 000000009079f76f [ 346.319994][T11129] kobject: 'tx-0' (000000008d5cbd13): auto cleanup 'remove' event [ 346.327782][T11129] kobject: 'tx-0' (000000008d5cbd13): kobject_uevent_env [ 346.334860][T11129] kobject: 'tx-0' (000000008d5cbd13): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 346.346153][T11129] kobject: 'tx-0' (000000008d5cbd13): auto cleanup kobject_del [ 346.353996][T11129] kobject: 'tx-0' (000000008d5cbd13): calling ktype release [ 346.362196][T11129] kobject: 'tx-0': free name [ 346.366806][T11129] kobject: 'queues' (000000009079f76f): kobject_cleanup, parent 00000000608fd6d8 [ 346.376014][T11129] kobject: 'queues' (000000009079f76f): calling ktype release [ 346.383514][T11129] kobject: 'queues' (000000009079f76f): kset_release [ 346.390628][T11129] kobject: 'queues': free name [ 346.395750][T11129] kobject: 'erspan0' (000000005a1a8c78): kobject_uevent_env [ 346.403536][T11129] kobject: 'erspan0' (000000005a1a8c78): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 346.414778][T11109] kobject: 'tunl0' (000000002816ff42): kobject_cleanup, parent 00000000608fd6d8 [ 346.414796][ T197] kobject: 'gretap0' (00000000e1ceae63): kobject_cleanup, parent 00000000608fd6d8 [ 346.423838][T11109] kobject: 'tunl0' (000000002816ff42): calling ktype release [ 346.423864][T11109] kobject: 'tunl0': free name [ 346.445605][ T197] kobject: 'gretap0' (00000000e1ceae63): calling ktype release [ 346.446407][T11109] kobject: 'rx-0' (00000000afdeca87): kobject_cleanup, parent 00000000aa03f9c6 [ 346.453232][ T197] kobject: 'gretap0': free name [ 346.467427][T11109] kobject: 'rx-0' (00000000afdeca87): auto cleanup 'remove' event [ 346.475326][T11109] kobject: 'rx-0' (00000000afdeca87): kobject_uevent_env [ 346.482419][T11109] kobject: 'rx-0' (00000000afdeca87): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 346.493333][T11109] kobject: 'rx-0' (00000000afdeca87): auto cleanup kobject_del [ 346.500938][T11109] kobject: 'rx-0' (00000000afdeca87): calling ktype release [ 346.508849][T11109] kobject: 'rx-0': free name [ 346.513491][T11109] kobject: 'tx-0' (00000000f3ddad05): kobject_cleanup, parent 00000000aa03f9c6 [ 346.522782][T11109] kobject: 'tx-0' (00000000f3ddad05): auto cleanup 'remove' event [ 346.530744][T11109] kobject: 'tx-0' (00000000f3ddad05): kobject_uevent_env [ 346.537791][T11109] kobject: 'tx-0' (00000000f3ddad05): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 346.548723][T11109] kobject: 'tx-0' (00000000f3ddad05): auto cleanup kobject_del [ 346.556355][T11109] kobject: 'tx-0' (00000000f3ddad05): calling ktype release [ 346.563671][T11109] kobject: 'tx-0': free name [ 346.568311][T11109] kobject: 'queues' (00000000aa03f9c6): kobject_cleanup, parent 00000000608fd6d8 [ 346.577432][T11109] kobject: 'queues' (00000000aa03f9c6): calling ktype release [ 346.584903][T11109] kobject: 'queues' (00000000aa03f9c6): kset_release [ 346.591654][T11109] kobject: 'queues': free name [ 346.596743][T11109] kobject: 'lo' (000000008a0756b2): kobject_uevent_env [ 346.603645][T11109] kobject: 'lo' (000000008a0756b2): fill_kobj_path: path = '/devices/virtual/net/lo' [ 346.687970][ T197] kobject: 'gretap0' (000000005222ef7b): kobject_cleanup, parent 00000000608fd6d8 [ 346.697192][ T197] kobject: 'gretap0' (000000005222ef7b): calling ktype release [ 346.704819][T11129] kobject: 'erspan0' (000000005a1a8c78): kobject_cleanup, parent 00000000608fd6d8 [ 346.709404][ T197] kobject: 'gretap0': free name [ 346.714054][T11129] kobject: 'erspan0' (000000005a1a8c78): calling ktype release [ 346.726406][T11129] kobject: 'erspan0': free name [ 346.732785][T11129] kobject: 'batman_adv' (00000000d32794a4): kobject_uevent_env [ 346.740372][T11129] kobject: 'batman_adv' (00000000d32794a4): kobject_uevent_env: filter function caused the event to drop! [ 346.751736][T11129] kobject: 'batman_adv' (00000000d32794a4): kobject_cleanup, parent 00000000608fd6d8 [ 346.762160][T11129] kobject: 'batman_adv' (00000000d32794a4): calling ktype release [ 346.770030][T11129] kobject: (00000000d32794a4): dynamic_kobj_release [ 346.776617][T11129] kobject: 'batman_adv': free name [ 346.782785][T11129] kobject: 'rx-0' (00000000bbbdcfba): kobject_cleanup, parent 00000000df56416a [ 346.792673][T11129] kobject: 'rx-0' (00000000bbbdcfba): auto cleanup 'remove' event [ 346.801639][T11129] kobject: 'rx-0' (00000000bbbdcfba): kobject_uevent_env [ 346.810162][T11129] kobject: 'rx-0' (00000000bbbdcfba): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 346.822142][T11129] kobject: 'rx-0' (00000000bbbdcfba): auto cleanup kobject_del [ 346.831436][T11129] kobject: 'rx-0' (00000000bbbdcfba): calling ktype release [ 346.840884][T11129] kobject: 'rx-0': free name [ 346.845590][T11129] kobject: 'tx-0' (0000000083bb8261): kobject_cleanup, parent 00000000df56416a [ 346.855591][T11129] kobject: 'tx-0' (0000000083bb8261): auto cleanup 'remove' event [ 346.864635][T11129] kobject: 'tx-0' (0000000083bb8261): kobject_uevent_env [ 346.872716][T11129] kobject: 'tx-0' (0000000083bb8261): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 346.884519][T11129] kobject: 'tx-0' (0000000083bb8261): auto cleanup kobject_del [ 346.893159][T11129] kobject: 'tx-0' (0000000083bb8261): calling ktype release [ 346.901149][T11129] kobject: 'tx-0': free name [ 346.905768][T11129] kobject: 'queues' (00000000df56416a): kobject_cleanup, parent 00000000608fd6d8 [ 346.916030][T11129] kobject: 'queues' (00000000df56416a): calling ktype release [ 346.924097][T11129] kobject: 'queues' (00000000df56416a): kset_release [ 346.931845][T11129] kobject: 'queues': free name [ 346.936962][T11129] kobject: 'gretap0' (00000000ec0e3d41): kobject_uevent_env [ 346.945573][T11129] kobject: 'gretap0' (00000000ec0e3d41): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 346.957186][T11109] kobject: 'lo' (000000008a0756b2): kobject_cleanup, parent 00000000608fd6d8 [ 346.957205][ T197] kobject: 'gretap0' (000000003725ee07): kobject_cleanup, parent 00000000608fd6d8 [ 346.967131][T11109] kobject: 'lo' (000000008a0756b2): calling ktype release [ 346.978010][ T197] kobject: 'gretap0' (000000003725ee07): calling ktype release [ 346.982939][T11109] kobject: 'lo': free name [ 346.992099][ T197] kobject: 'gretap0': free name [ 347.137920][T11129] kobject: 'gretap0' (00000000ec0e3d41): kobject_cleanup, parent 00000000608fd6d8 [ 347.147160][T11129] kobject: 'gretap0' (00000000ec0e3d41): calling ktype release [ 347.157251][T11129] kobject: 'gretap0': free name [ 347.163869][ T197] kobject: 'gretap0' (0000000096d9d74c): kobject_cleanup, parent 00000000608fd6d8 [ 347.176295][T11129] kobject: 'rx-0' (000000003e9168d6): kobject_cleanup, parent 00000000183a85c2 [ 347.185303][ T197] kobject: 'gretap0' (0000000096d9d74c): calling ktype release [ 347.195600][T11129] kobject: 'rx-0' (000000003e9168d6): auto cleanup 'remove' event [ 347.203513][ T197] kobject: 'gretap0': free name [ 347.211032][T11129] kobject: 'rx-0' (000000003e9168d6): kobject_uevent_env [ 347.218163][T11129] kobject: 'rx-0' (000000003e9168d6): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 347.231677][T11129] kobject: 'rx-0' (000000003e9168d6): auto cleanup kobject_del [ 347.239353][T11129] kobject: 'rx-0' (000000003e9168d6): calling ktype release [ 347.246632][T11129] kobject: 'rx-0': free name [ 347.253912][T11129] kobject: 'tx-0' (0000000037a4312e): kobject_cleanup, parent 00000000183a85c2 [ 347.262917][T11129] kobject: 'tx-0' (0000000037a4312e): auto cleanup 'remove' event [ 347.274478][T11129] kobject: 'tx-0' (0000000037a4312e): kobject_uevent_env [ 347.281587][T11129] kobject: 'tx-0' (0000000037a4312e): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 347.292642][T11129] kobject: 'tx-0' (0000000037a4312e): auto cleanup kobject_del [ 347.300310][T11129] kobject: 'tx-0' (0000000037a4312e): calling ktype release [ 347.307648][T11129] kobject: 'tx-0': free name [ 347.312355][T11129] kobject: 'queues' (00000000183a85c2): kobject_cleanup, parent 00000000608fd6d8 [ 347.321507][T11129] kobject: 'queues' (00000000183a85c2): calling ktype release [ 347.328990][T11129] kobject: 'queues' (00000000183a85c2): kset_release [ 347.335658][T11129] kobject: 'queues': free name [ 347.340899][T11129] kobject: 'gre0' (000000006c72c0f0): kobject_uevent_env [ 347.347958][T11129] kobject: 'gre0' (000000006c72c0f0): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 347.407953][ T197] kobject: 'gretap0' (00000000991042ac): kobject_cleanup, parent 00000000608fd6d8 [ 347.417193][ T197] kobject: 'gretap0' (00000000991042ac): calling ktype release [ 347.424869][ T197] kobject: 'gretap0': free name [ 347.547968][T11129] kobject: 'gre0' (000000006c72c0f0): kobject_cleanup, parent 00000000608fd6d8 [ 347.556958][T11129] kobject: 'gre0' (000000006c72c0f0): calling ktype release [ 347.564338][T11129] kobject: 'gre0': free name [ 347.569463][T11129] kobject: 'rx-0' (00000000c37d0698): kobject_cleanup, parent 0000000060cac2b7 [ 347.578491][T11129] kobject: 'rx-0' (00000000c37d0698): auto cleanup 'remove' event [ 347.586348][T11129] kobject: 'rx-0' (00000000c37d0698): kobject_uevent_env [ 347.593447][T11129] kobject: 'rx-0' (00000000c37d0698): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 347.605567][T11129] kobject: 'rx-0' (00000000c37d0698): auto cleanup kobject_del [ 347.613201][T11129] kobject: 'rx-0' (00000000c37d0698): calling ktype release [ 347.620545][T11129] kobject: 'rx-0': free name [ 347.625168][T11129] kobject: 'tx-0' (0000000095181bb8): kobject_cleanup, parent 0000000060cac2b7 [ 347.634118][T11129] kobject: 'tx-0' (0000000095181bb8): auto cleanup 'remove' event [ 347.641999][T11129] kobject: 'tx-0' (0000000095181bb8): kobject_uevent_env [ 347.649077][T11129] kobject: 'tx-0' (0000000095181bb8): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 347.660119][T11129] kobject: 'tx-0' (0000000095181bb8): auto cleanup kobject_del [ 347.667767][T11129] kobject: 'tx-0' (0000000095181bb8): calling ktype release [ 347.675155][T11129] kobject: 'tx-0': free name [ 347.679828][T11129] kobject: 'queues' (0000000060cac2b7): kobject_cleanup, parent 00000000608fd6d8 [ 347.688947][T11129] kobject: 'queues' (0000000060cac2b7): calling ktype release [ 347.696426][T11129] kobject: 'queues' (0000000060cac2b7): kset_release [ 347.703154][T11129] kobject: 'queues': free name [ 347.709432][T11129] kobject: 'tunl0' (000000002d9fb83c): kobject_uevent_env [ 347.716653][T11129] kobject: 'tunl0' (000000002d9fb83c): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 347.726944][ T197] kobject: 'gretap0' (0000000063eb8757): kobject_cleanup, parent 00000000608fd6d8 [ 347.736316][ T197] kobject: 'gretap0' (0000000063eb8757): calling ktype release [ 347.744341][ T197] kobject: 'gretap0': free name [ 347.758397][T11109] kobject: 'nfs_client' (000000007a80e841): kobject_uevent_env [ 347.766016][T11109] kobject: 'nfs_client' (000000007a80e841): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 347.776447][T11109] kobject: 'nfs_client' (000000007a80e841): kobject_cleanup, parent 00000000608fd6d8 [ 347.785959][T11109] kobject: 'nfs_client' (000000007a80e841): calling ktype release [ 347.793813][T11109] kobject: 'nfs_client': free name 17:14:55 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) 17:14:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) 17:14:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 17:14:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 17:14:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 347.928989][ T197] kobject: 'gretap0' (00000000bfc5c650): kobject_cleanup, parent 00000000608fd6d8 [ 347.938397][T11129] kobject: 'tunl0' (000000002d9fb83c): kobject_cleanup, parent 00000000608fd6d8 [ 347.947420][T11129] kobject: 'tunl0' (000000002d9fb83c): calling ktype release [ 347.956273][ T4108] kobject: 'loop2' (00000000fec0c522): kobject_uevent_env [ 347.961098][T11163] kobject: 'nfs_client' (00000000c5cd11d9): kobject_add_internal: parent: 'net', set: 'nfs' [ 347.974722][T11129] kobject: 'tunl0': free name [ 347.981443][T11129] kobject: 'rx-0' (00000000acfa9fbe): kobject_cleanup, parent 000000008252cdcb [ 347.990704][ T4108] kobject: 'loop2' (00000000fec0c522): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 347.991132][ T197] kobject: 'gretap0' (00000000bfc5c650): calling ktype release [ 348.007935][T11163] kobject: 'nfs_client' (00000000c5cd11d9): kobject_uevent_env [ 348.008770][T11129] kobject: 'rx-0' (00000000acfa9fbe): auto cleanup 'remove' event 17:14:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f00000003c0)=[{&(0x7f00000000c0)="39000000140081ac00002c000500018701546f0800000005ae4b0000000200ffc54c1960dbb7d58259483533a055a653b4a421556b3d5df500", 0x137}], 0x1}, 0x0) [ 348.032939][ T197] kobject: 'gretap0': free name [ 348.041248][T11129] kobject: 'rx-0' (00000000acfa9fbe): kobject_uevent_env [ 348.052716][T11163] kobject: 'nfs_client' (00000000c5cd11d9): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 348.054037][T11129] kobject: 'rx-0' (00000000acfa9fbe): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 348.090173][ T4108] kobject: 'loop1' (00000000b10a0040): kobject_uevent_env [ 348.097355][ T4108] kobject: 'loop1' (00000000b10a0040): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 348.103122][T11129] kobject: 'rx-0' (00000000acfa9fbe): auto cleanup kobject_del 17:14:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ptmx\x00', 0x402, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000001380)=ANY=[]], 0x9a9c) ioctl$TCSETSF(r1, 0x2, &(0x7f0000000040)) [ 348.145822][T11163] IPVS: ftp: loaded support on port[0] = 21 [ 348.155711][T11129] kobject: 'rx-0' (00000000acfa9fbe): calling ktype release [ 348.174903][ T4108] kobject: 'loop3' (00000000df1053be): kobject_uevent_env [ 348.182340][T11129] kobject: 'rx-0': free name [ 348.187179][T11129] kobject: 'tx-0' (0000000087a79cb9): kobject_cleanup, parent 000000008252cdcb [ 348.200617][ T4108] kobject: 'loop3' (00000000df1053be): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 348.217910][T11129] kobject: 'tx-0' (0000000087a79cb9): auto cleanup 'remove' event [ 348.228015][T11129] kobject: 'tx-0' (0000000087a79cb9): kobject_uevent_env [ 348.240607][T11129] kobject: 'tx-0' (0000000087a79cb9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 348.245109][ T4108] kobject: 'loop1' (00000000b10a0040): kobject_uevent_env [ 348.260301][T11129] kobject: 'tx-0' (0000000087a79cb9): auto cleanup kobject_del [ 348.274647][T11129] kobject: 'tx-0' (0000000087a79cb9): calling ktype release [ 348.287587][T11129] kobject: 'tx-0': free name [ 348.294919][ T4108] kobject: 'loop1' (00000000b10a0040): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 348.306454][T11129] kobject: 'queues' (000000008252cdcb): kobject_cleanup, parent 00000000608fd6d8 [ 348.333402][T11129] kobject: 'queues' (000000008252cdcb): calling ktype release [ 348.335323][ T4108] kobject: 'loop3' (00000000df1053be): kobject_uevent_env [ 348.341789][T11129] kobject: 'queues' (000000008252cdcb): kset_release [ 348.355116][T11129] kobject: 'queues': free name [ 348.360262][ T4108] kobject: 'loop3' (00000000df1053be): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 348.371931][T11129] kobject: 'lo' (00000000a7a70e95): kobject_uevent_env [ 348.379174][T11129] kobject: 'lo' (00000000a7a70e95): fill_kobj_path: path = '/devices/virtual/net/lo' [ 348.390211][ T197] kobject: 'gretap0' (000000000b21e607): kobject_cleanup, parent 00000000608fd6d8 [ 348.390383][T11163] kobject: 'lo' (00000000f8fa23a6): kobject_add_internal: parent: 'net', set: 'devices' [ 348.401024][ T197] kobject: 'gretap0' (000000000b21e607): calling ktype release [ 348.417230][T11163] kobject: 'lo' (00000000f8fa23a6): kobject_uevent_env [ 348.419931][ T197] kobject: 'gretap0': free name [ 348.424250][T11163] kobject: 'lo' (00000000f8fa23a6): fill_kobj_path: path = '/devices/virtual/net/lo' [ 348.438762][T11163] kobject: 'queues' (00000000fbcd2ed3): kobject_add_internal: parent: 'lo', set: '' [ 348.448757][T11163] kobject: 'queues' (00000000fbcd2ed3): kobject_uevent_env [ 348.456390][T11163] kobject: 'queues' (00000000fbcd2ed3): kobject_uevent_env: filter function caused the event to drop! [ 348.467372][T11163] kobject: 'rx-0' (00000000ed7a6e5a): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.477488][T11163] kobject: 'rx-0' (00000000ed7a6e5a): kobject_uevent_env [ 348.485375][T11163] kobject: 'rx-0' (00000000ed7a6e5a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 348.496168][T11163] kobject: 'tx-0' (000000002fbaeb8f): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.506505][T11163] kobject: 'tx-0' (000000002fbaeb8f): kobject_uevent_env [ 348.513601][T11163] kobject: 'tx-0' (000000002fbaeb8f): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 348.525624][T11163] kobject: 'tunl0' (0000000006ad5811): kobject_add_internal: parent: 'net', set: 'devices' [ 348.536238][T11163] kobject: 'tunl0' (0000000006ad5811): kobject_uevent_env [ 348.543623][T11163] kobject: 'tunl0' (0000000006ad5811): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 348.553713][T11163] kobject: 'queues' (0000000057668eec): kobject_add_internal: parent: 'tunl0', set: '' [ 348.563924][T11163] kobject: 'queues' (0000000057668eec): kobject_uevent_env [ 348.571154][T11163] kobject: 'queues' (0000000057668eec): kobject_uevent_env: filter function caused the event to drop! [ 348.582172][T11163] kobject: 'rx-0' (0000000047038890): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.593079][T11163] kobject: 'rx-0' (0000000047038890): kobject_uevent_env [ 348.600190][T11163] kobject: 'rx-0' (0000000047038890): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 348.611234][T11163] kobject: 'tx-0' (000000003bd9bd66): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.621438][T11163] kobject: 'tx-0' (000000003bd9bd66): kobject_uevent_env [ 348.628521][T11163] kobject: 'tx-0' (000000003bd9bd66): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 348.640356][T11163] kobject: 'gre0' (000000001a07db22): kobject_add_internal: parent: 'net', set: 'devices' [ 348.650737][T11163] kobject: 'gre0' (000000001a07db22): kobject_uevent_env [ 348.657784][T11163] kobject: 'gre0' (000000001a07db22): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 348.667776][T11163] kobject: 'queues' (00000000e44c87dc): kobject_add_internal: parent: 'gre0', set: '' [ 348.678005][T11163] kobject: 'queues' (00000000e44c87dc): kobject_uevent_env [ 348.685194][T11163] kobject: 'queues' (00000000e44c87dc): kobject_uevent_env: filter function caused the event to drop! [ 348.696198][T11163] kobject: 'rx-0' (00000000575e03d1): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.707473][T11163] kobject: 'rx-0' (00000000575e03d1): kobject_uevent_env [ 348.714563][T11163] kobject: 'rx-0' (00000000575e03d1): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 348.725527][T11163] kobject: 'tx-0' (00000000d1edbf43): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.735730][T11163] kobject: 'tx-0' (00000000d1edbf43): kobject_uevent_env [ 348.742795][T11163] kobject: 'tx-0' (00000000d1edbf43): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0'