/4096}, 0x48) 14:15:40 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:40 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:15:40 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() 14:15:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x80ffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 594.936308][T20035] IPVS: ftp: loaded support on port[0] = 21 [ 595.025568][T20047] IPVS: ftp: loaded support on port[0] = 21 [ 595.039120][T20045] IPVS: ftp: loaded support on port[0] = 21 14:15:43 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:15:43 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x1000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:43 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:43 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:15:43 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() 14:15:43 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 597.622669][T20064] IPVS: ftp: loaded support on port[0] = 21 [ 597.626752][T20058] IPVS: ftp: loaded support on port[0] = 21 14:15:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x2000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:43 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 597.673149][T20071] IPVS: ftp: loaded support on port[0] = 21 [ 597.685636][T20067] IPVS: ftp: loaded support on port[0] = 21 14:15:43 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x3000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 597.821315][ C1] net_ratelimit: 26 callbacks suppressed [ 597.821323][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 597.832817][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:15:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x4000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 597.973110][T20093] IPVS: ftp: loaded support on port[0] = 21 [ 598.211295][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.217191][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 598.381429][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.387259][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 598.771427][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.777361][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 598.931406][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.937267][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:15:46 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:15:46 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:46 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:15:46 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r0) pause() 14:15:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x5000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:46 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:46 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() [ 600.267606][T20109] IPVS: ftp: loaded support on port[0] = 21 [ 600.333644][T20116] IPVS: ftp: loaded support on port[0] = 21 [ 600.342087][T20110] IPVS: ftp: loaded support on port[0] = 21 [ 600.351982][T20120] IPVS: ftp: loaded support on port[0] = 21 14:15:46 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:46 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x7000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:46 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 600.667457][T20138] IPVS: ftp: loaded support on port[0] = 21 [ 600.819893][T20147] IPVS: ftp: loaded support on port[0] = 21 14:15:48 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:15:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x8000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:48 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:15:48 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:48 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:48 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 602.852846][T20158] IPVS: ftp: loaded support on port[0] = 21 [ 602.890535][T20161] IPVS: ftp: loaded support on port[0] = 21 [ 602.891029][T20165] IPVS: ftp: loaded support on port[0] = 21 14:15:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x9000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 602.909931][T20162] IPVS: ftp: loaded support on port[0] = 21 [ 602.931353][ C1] net_ratelimit: 24 callbacks suppressed [ 602.931360][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 602.942904][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 602.954080][T20171] IPVS: ftp: loaded support on port[0] = 21 14:15:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xa000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xf000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 603.091340][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 603.097274][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 603.171329][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 603.177167][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:15:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x10000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x14000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x18100000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 603.411294][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 603.417173][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 604.051313][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.057168][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:15:51 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:15:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x20000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:51 executing program 3: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:51 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:51 executing program 4: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:51 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x376f0900}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 605.242852][T20210] IPVS: ftp: loaded support on port[0] = 21 [ 605.250703][T20214] IPVS: ftp: loaded support on port[0] = 21 [ 605.253879][T20219] IPVS: ftp: loaded support on port[0] = 21 [ 605.266098][T20215] IPVS: ftp: loaded support on port[0] = 21 [ 605.272934][T20212] IPVS: ftp: loaded support on port[0] = 21 14:15:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x3c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x3f000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x40000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x48000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x4c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:53 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:15:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x5e000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:53 executing program 2: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:53 executing program 3: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:53 executing program 4: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:53 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() [ 607.295652][T20258] IPVS: ftp: loaded support on port[0] = 21 [ 607.320810][T20255] IPVS: ftp: loaded support on port[0] = 21 [ 607.343871][T20263] IPVS: ftp: loaded support on port[0] = 21 [ 607.356379][T20265] IPVS: ftp: loaded support on port[0] = 21 14:15:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x61000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x63000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:53 executing program 2: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x68000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:53 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x6c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 607.852025][T20286] IPVS: ftp: loaded support on port[0] = 21 [ 607.932320][T20290] IPVS: ftp: loaded support on port[0] = 21 [ 608.211309][ C1] net_ratelimit: 26 callbacks suppressed [ 608.211317][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 608.217064][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:15:55 executing program 4: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:55 executing program 3: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:15:55 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:15:55 executing program 2: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x71000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:55 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:15:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x73000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 609.006371][T20305] IPVS: ftp: loaded support on port[0] = 21 [ 609.007841][T20313] IPVS: ftp: loaded support on port[0] = 21 [ 609.030193][T20311] IPVS: ftp: loaded support on port[0] = 21 [ 609.039134][T20315] IPVS: ftp: loaded support on port[0] = 21 14:15:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x74000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x7a000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:55 executing program 2: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:55 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:15:55 executing program 3: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 609.479173][T20335] IPVS: ftp: loaded support on port[0] = 21 [ 609.496963][T20333] IPVS: ftp: loaded support on port[0] = 21 [ 609.591907][T20341] IPVS: ftp: loaded support on port[0] = 21 [ 609.608924][T20345] IPVS: ftp: loaded support on port[0] = 21 14:15:55 executing program 4: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x85ffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:55 executing program 2: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x908a0a00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 609.876244][T20354] IPVS: ftp: loaded support on port[0] = 21 [ 609.888326][T20358] IPVS: ftp: loaded support on port[0] = 21 14:15:56 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 610.110709][T20370] IPVS: ftp: loaded support on port[0] = 21 [ 610.194150][T20333] chnl_net:caif_netlink_parms(): no params data found [ 610.329365][T20333] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.339244][T20333] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.368981][T20333] device bridge_slave_0 entered promiscuous mode [ 610.393144][T20333] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.408507][T20333] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.424950][T20333] device bridge_slave_1 entered promiscuous mode [ 610.454386][T20333] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 610.487243][T20333] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 610.540570][T20333] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 610.559398][T20333] team0: Port device team_slave_0 added [ 610.568522][T20333] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 610.586154][T20333] team0: Port device team_slave_1 added [ 610.599017][T20333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 610.607293][T20333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 610.705014][T20333] device hsr_slave_0 entered promiscuous mode [ 610.741583][T20333] device hsr_slave_1 entered promiscuous mode [ 610.779691][T20333] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 610.787635][T20333] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 610.809419][T20333] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.816478][T20333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.823853][T20333] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.830896][T20333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.883932][T20333] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 610.890715][T20333] 8021q: adding VLAN 0 to HW filter on device bond0 [ 610.901704][T20333] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 610.914562][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.923511][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.932096][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.941702][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 610.964590][T20333] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 610.980522][T20333] 8021q: adding VLAN 0 to HW filter on device team0 [ 611.002279][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 611.010677][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.017832][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.044625][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 611.054382][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.061518][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 611.070442][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 611.093081][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 611.102296][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 611.110930][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 611.119785][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 611.131737][T20333] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 611.138532][T20333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 611.157919][T20333] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 611.176384][T20333] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 611.274475][T20384] IPVS: ftp: loaded support on port[0] = 21 14:15:57 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:15:57 executing program 2: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x9cffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:57 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:15:57 executing program 3: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:15:57 executing program 4: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 611.426639][T20397] IPVS: ftp: loaded support on port[0] = 21 [ 611.436010][T20403] IPVS: ftp: loaded support on port[0] = 21 [ 611.449597][T20395] IPVS: ftp: loaded support on port[0] = 21 [ 611.458001][T20391] IPVS: ftp: loaded support on port[0] = 21 14:15:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x9fffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 611.473620][T20400] IPVS: ftp: loaded support on port[0] = 21 14:15:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xa8000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:57 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:57 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 611.851159][T20421] IPVS: ftp: loaded support on port[0] = 21 14:15:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xe4ffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 611.929088][T20426] IPVS: ftp: loaded support on port[0] = 21 14:15:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xff000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:58 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xff0f0000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:58 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:15:58 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:15:58 executing program 3: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:58 executing program 4: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 612.335455][T20439] IPVS: ftp: loaded support on port[0] = 21 [ 612.348054][T20450] IPVS: ftp: loaded support on port[0] = 21 14:15:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xffff8000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 612.411633][T20447] IPVS: ftp: loaded support on port[0] = 21 [ 612.419127][T20454] IPVS: ftp: loaded support on port[0] = 21 [ 612.465120][T20457] IPVS: ftp: loaded support on port[0] = 21 14:15:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xffffff85}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xffffff9c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:58 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 612.917656][T20478] IPVS: ftp: loaded support on port[0] = 21 14:15:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xffffffe4}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x1000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:59 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:15:59 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:15:59 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 613.226029][T20492] IPVS: ftp: loaded support on port[0] = 21 14:15:59 executing program 3: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x10000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 613.340945][T20498] IPVS: ftp: loaded support on port[0] = 21 [ 613.373487][T20504] IPVS: ftp: loaded support on port[0] = 21 [ 613.465604][T20509] IPVS: ftp: loaded support on port[0] = 21 14:15:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x40000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:59 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:15:59 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:15:59 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:15:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x80ffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:15:59 executing program 3: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) [ 613.852700][T20521] IPVS: ftp: loaded support on port[0] = 21 [ 613.907307][T20527] IPVS: ftp: loaded support on port[0] = 21 [ 613.921671][T20530] IPVS: ftp: loaded support on port[0] = 21 14:16:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 613.985241][T20538] IPVS: ftp: loaded support on port[0] = 21 14:16:00 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x200000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 614.158323][T20550] IPVS: ftp: loaded support on port[0] = 21 14:16:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:00 executing program 3: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 14:16:00 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 614.574263][T20562] IPVS: ftp: loaded support on port[0] = 21 14:16:00 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:00 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:16:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x500000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 614.756821][T20568] IPVS: ftp: loaded support on port[0] = 21 [ 614.832502][T20576] IPVS: ftp: loaded support on port[0] = 21 14:16:01 executing program 3: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x600000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 614.922755][T20579] IPVS: ftp: loaded support on port[0] = 21 14:16:01 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x700000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 615.144501][T20593] IPVS: ftp: loaded support on port[0] = 21 [ 615.145446][T20597] IPVS: ftp: loaded support on port[0] = 21 14:16:01 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 14:16:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:01 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 615.465239][T20611] IPVS: ftp: loaded support on port[0] = 21 14:16:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x900000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:01 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() [ 615.612886][T20616] IPVS: ftp: loaded support on port[0] = 21 14:16:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xa00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 615.753038][T20624] IPVS: ftp: loaded support on port[0] = 21 14:16:01 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 14:16:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xf00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:02 executing program 3: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x204000, 0x0) 14:16:02 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 615.964622][T20635] IPVS: ftp: loaded support on port[0] = 21 14:16:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x1000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 616.035292][T20641] IPVS: ftp: loaded support on port[0] = 21 [ 616.119238][T20646] IPVS: ftp: loaded support on port[0] = 21 14:16:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x1400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:02 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 14:16:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x1810000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:02 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:02 executing program 3 (fault-call:5 fault-nth:0): clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:02 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:02 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 616.517377][T20664] IPVS: ftp: loaded support on port[0] = 21 14:16:02 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x2000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 616.600596][T20672] IPVS: ftp: loaded support on port[0] = 21 14:16:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x376f090000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:03 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:03 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:03 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:16:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x3c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x3f00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 617.008523][T20704] IPVS: ftp: loaded support on port[0] = 21 [ 617.037838][T20710] IPVS: ftp: loaded support on port[0] = 21 14:16:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x4000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 617.360064][T20684] FAULT_INJECTION: forcing a failure. [ 617.360064][T20684] name fail_futex, interval 1, probability 0, space 0, times 1 [ 617.381508][T20684] CPU: 0 PID: 20684 Comm: syz-executor3 Not tainted 5.0.0-rc3-next-20190122 #17 [ 617.390591][T20684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.400671][T20684] Call Trace: [ 617.404034][T20684] dump_stack+0x1db/0x2d0 [ 617.408373][T20684] ? dump_stack_print_info.cold+0x20/0x20 [ 617.414144][T20684] should_fail.cold+0xa/0x14 [ 617.418736][T20684] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 617.424565][T20684] ? mark_held_locks+0xf0/0xf0 [ 617.429337][T20684] ? __lock_acquire+0x572/0x4a10 [ 617.434273][T20684] ? print_usage_bug+0xd0/0xd0 [ 617.439097][T20684] get_futex_key+0x115f/0x2070 [ 617.443911][T20684] ? __lock_acquire+0x572/0x4a10 [ 617.448855][T20684] ? check_noncircular+0x20/0x20 [ 617.453794][T20684] ? mark_wake_futex+0x250/0x250 [ 617.458737][T20684] ? mark_held_locks+0xf0/0xf0 [ 617.463497][T20684] ? rcu_read_unlock_special+0x380/0x380 [ 617.469131][T20684] ? rcu_softirq_qs+0x20/0x20 [ 617.473804][T20684] ? print_usage_bug+0xd0/0xd0 [ 617.478567][T20684] ? print_usage_bug+0xd0/0xd0 [ 617.483338][T20684] ? mark_held_locks+0xf0/0xf0 [ 617.488109][T20684] ? check_noncircular+0x20/0x20 [ 617.493051][T20684] ? print_usage_bug+0xd0/0xd0 [ 617.497812][T20684] ? check_noncircular+0x20/0x20 [ 617.502758][T20684] ? __lock_acquire+0x572/0x4a10 [ 617.507688][T20684] ? mark_held_locks+0xf0/0xf0 [ 617.512451][T20684] ? print_usage_bug+0xd0/0xd0 [ 617.517253][T20684] ? print_usage_bug+0xd0/0xd0 [ 617.522016][T20684] futex_wake+0x1a4/0x7b0 [ 617.526368][T20684] ? __lock_acquire+0x572/0x4a10 [ 617.531342][T20684] ? get_futex_key+0x2070/0x2070 [ 617.536271][T20684] ? print_usage_bug+0xd0/0xd0 [ 617.541036][T20684] ? __lock_acquire+0x572/0x4a10 [ 617.545978][T20684] ? mark_held_locks+0xf0/0xf0 [ 617.550797][T20684] do_futex+0x371/0x2910 [ 617.555045][T20684] ? mark_held_locks+0xf0/0xf0 [ 617.559808][T20684] ? __lock_acquire+0x572/0x4a10 [ 617.564741][T20684] ? find_held_lock+0x35/0x120 [ 617.569503][T20684] ? add_lock_to_list.isra.0+0x450/0x450 [ 617.575143][T20684] ? exit_robust_list+0x290/0x290 [ 617.580212][T20684] ? __delayacct_add_tsk+0x65f/0x790 [ 617.585503][T20684] ? add_lock_to_list.isra.0+0x450/0x450 [ 617.591163][T20684] ? __might_fault+0x12b/0x1e0 [ 617.595929][T20684] ? find_held_lock+0x35/0x120 [ 617.600700][T20684] ? __might_fault+0x12b/0x1e0 [ 617.605467][T20684] ? __might_fault+0x12b/0x1e0 [ 617.610226][T20684] ? find_held_lock+0x35/0x120 [ 617.614986][T20684] ? __might_fault+0x12b/0x1e0 [ 617.619750][T20684] ? lock_acquire+0x1db/0x570 [ 617.624436][T20684] ? lock_downgrade+0xc40/0xc40 [ 617.629283][T20684] ? lock_release+0xc40/0xc40 [ 617.634040][T20684] mm_release+0x453/0x5d0 [ 617.638379][T20684] ? mm_access+0x150/0x150 [ 617.642828][T20684] ? _raw_spin_unlock_irq+0x5e/0x90 [ 617.648026][T20684] ? acct_collect+0x699/0x860 [ 617.652710][T20684] do_exit+0x4cb/0x2b60 [ 617.656875][T20684] ? mm_update_next_owner+0x970/0x970 [ 617.662248][T20684] ? page_alloc_cpu_dead+0x30/0x30 [ 617.667359][T20684] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 617.673166][T20684] ? __free_pages_ok+0x8bc/0x1520 [ 617.678199][T20684] ? __free_pages_ok+0x8bc/0x1520 [ 617.683221][T20684] ? lockdep_hardirqs_on+0x418/0x5d0 [ 617.688508][T20684] ? mark_held_locks+0xf0/0xf0 [ 617.693271][T20684] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 617.699509][T20684] ? kernel_poison_pages+0x17f/0x2c0 [ 617.704837][T20684] ? free_one_page+0x1770/0x1770 [ 617.709770][T20684] ? add_lock_to_list.isra.0+0x450/0x450 [ 617.715453][T20684] ? memset+0x32/0x40 [ 617.719432][T20684] ? __dequeue_signal+0xeb/0x730 [ 617.724370][T20684] ? get_signal+0x966/0x19c0 [ 617.728965][T20684] ? find_held_lock+0x35/0x120 [ 617.733727][T20684] ? get_signal+0x966/0x19c0 [ 617.738314][T20684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 617.744571][T20684] ? _raw_spin_unlock_irq+0x28/0x90 [ 617.749769][T20684] ? _raw_spin_unlock_irq+0x28/0x90 [ 617.754975][T20684] do_group_exit+0x177/0x430 [ 617.759585][T20684] ? trace_hardirqs_off_caller+0x300/0x300 [ 617.765563][T20684] ? __ia32_sys_exit+0x50/0x50 [ 617.770328][T20684] get_signal+0x8b7/0x19c0 [ 617.774770][T20684] ? ptrace_notify+0x130/0x130 [ 617.779531][T20684] ? __switch_to_asm+0x34/0x70 [ 617.784296][T20684] ? __bpf_trace_sched_wake_idle_without_ipi+0x10/0x10 [ 617.791163][T20684] ? __switch_to_asm+0x34/0x70 [ 617.795926][T20684] ? __switch_to_asm+0x40/0x70 [ 617.800690][T20684] ? __switch_to_asm+0x34/0x70 [ 617.805451][T20684] ? __switch_to_asm+0x34/0x70 [ 617.810214][T20684] ? __switch_to_asm+0x34/0x70 [ 617.814976][T20684] ? __switch_to_asm+0x34/0x70 [ 617.819740][T20684] ? __switch_to_asm+0x40/0x70 [ 617.824500][T20684] ? __switch_to_asm+0x34/0x70 [ 617.829287][T20684] ? __switch_to_asm+0x40/0x70 [ 617.834103][T20684] do_signal+0x91/0x1ea0 [ 617.838357][T20684] ? pci_mmcfg_check_reserved+0x170/0x170 [ 617.844082][T20684] ? setup_sigcontext+0x7d0/0x7d0 [ 617.849125][T20684] ? exit_to_usermode_loop+0x98/0x3b0 [ 617.854491][T20684] ? exit_to_usermode_loop+0x98/0x3b0 [ 617.859874][T20684] ? lockdep_hardirqs_on+0x418/0x5d0 [ 617.865173][T20684] ? trace_hardirqs_off_caller+0x300/0x300 [ 617.870981][T20684] ? schedule+0x108/0x350 [ 617.875310][T20684] ? do_syscall_64+0x8c/0x800 [ 617.879991][T20684] exit_to_usermode_loop+0x2f7/0x3b0 [ 617.885279][T20684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.891346][T20684] ? syscall_trace_enter+0x12a0/0x12a0 [ 617.897021][T20684] ? __ia32_sys_pause+0x8b/0x140 [ 617.901974][T20684] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 617.908215][T20684] ? __ia32_sys_pause+0xf5/0x140 [ 617.913154][T20684] do_syscall_64+0x696/0x800 [ 617.917747][T20684] ? syscall_return_slowpath+0x5f0/0x5f0 [ 617.923378][T20684] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 617.929107][T20684] ? __switch_to_asm+0x34/0x70 [ 617.933872][T20684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 617.939448][T20684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.945363][T20684] RIP: 0033:0x458099 [ 617.949262][T20684] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.968863][T20684] RSP: 002b:00007f1bab0a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000022 [ 617.977268][T20684] RAX: fffffffffffffdfe RBX: 00007f1bab0a3c90 RCX: 0000000000458099 [ 617.985231][T20684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 617.993209][T20684] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 618.001245][T20684] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bab0a46d4 [ 618.009239][T20684] R13: 00000000004c4647 R14: 00000000004d7b40 R15: 0000000000000003 14:16:04 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x4800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:04 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:16:04 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:04 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:04 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 618.198100][T20733] IPVS: ftp: loaded support on port[0] = 21 [ 618.209463][T20730] IPVS: ftp: loaded support on port[0] = 21 [ 618.237768][T20740] IPVS: ftp: loaded support on port[0] = 21 14:16:04 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() [ 618.246471][T20737] IPVS: ftp: loaded support on port[0] = 21 14:16:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x4c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x5e00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 618.387114][T20752] IPVS: ftp: loaded support on port[0] = 21 14:16:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x6100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:04 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:16:04 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) r0 = socket$unix(0x1, 0x7, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x402100, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000040), 0x4) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0xb99, 0x6, 0x40, 0x1f, 0x1f}, {0x6b4f, 0x6, 0x1, 0x59, 0x7, 0x8}], [[], [], [], []]}) 14:16:04 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x6300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 618.778504][T20765] IPVS: ftp: loaded support on port[0] = 21 [ 618.835064][T20770] IPVS: ftp: loaded support on port[0] = 21 [ 618.899059][T20776] IPVS: ftp: loaded support on port[0] = 21 14:16:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x6800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:05 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x6c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 619.214743][T20787] IPVS: ftp: loaded support on port[0] = 21 [ 619.224897][T20770] IPVS: ftp: loaded support on port[0] = 21 14:16:09 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x7100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:09 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:09 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:16:09 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() [ 623.710885][T20801] IPVS: ftp: loaded support on port[0] = 21 14:16:09 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x7300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 623.776895][T20805] IPVS: ftp: loaded support on port[0] = 21 [ 623.785841][T20808] IPVS: ftp: loaded support on port[0] = 21 [ 623.894600][T20819] IPVS: ftp: loaded support on port[0] = 21 [ 623.916365][T20821] IPVS: ftp: loaded support on port[0] = 21 14:16:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x7400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x7a00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x85ffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x908a0a0000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x9cffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 624.674540][T20828] IPVS: ftp: loaded support on port[0] = 21 [ 628.714209][ T8551] device bridge_slave_1 left promiscuous mode [ 628.720450][ T8551] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.842054][ T8551] device bridge_slave_0 left promiscuous mode [ 628.848298][ T8551] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.118185][ T8551] bond3 (unregistering): Released all slaves [ 634.132400][ T8551] bond2 (unregistering): Released all slaves [ 634.147713][ T8551] bond1 (unregistering): Released all slaves [ 634.203696][ T8551] device hsr_slave_1 left promiscuous mode [ 634.245184][ T8551] device hsr_slave_0 left promiscuous mode [ 634.285579][ T8551] team0 (unregistering): Port device team_slave_1 removed [ 634.301653][ T8551] team0 (unregistering): Port device team_slave_0 removed [ 634.313686][ T8551] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 634.371043][ T8551] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 634.460883][ T8551] bond0 (unregistering): Released all slaves 14:16:20 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x9fffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:21 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:21 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() 14:16:21 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 635.367731][T20859] IPVS: ftp: loaded support on port[0] = 21 14:16:21 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xa800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:21 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 635.410022][T20863] IPVS: ftp: loaded support on port[0] = 21 [ 635.411469][T20866] IPVS: ftp: loaded support on port[0] = 21 [ 635.478218][T20871] IPVS: ftp: loaded support on port[0] = 21 14:16:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xe4ffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 635.522419][T20877] IPVS: ftp: loaded support on port[0] = 21 14:16:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xff00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xff0f000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0xffffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 636.307033][T20877] IPVS: ftp: loaded support on port[0] = 21 14:16:26 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:26 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:26 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() 14:16:26 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', r3}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x36fbc959, 0x0, 0x82}, 0xc) [ 640.200079][T20913] IPVS: ftp: loaded support on port[0] = 21 [ 640.218042][T20915] IPVS: ftp: loaded support on port[0] = 21 [ 640.225518][T20916] IPVS: ftp: loaded support on port[0] = 21 [ 640.239343][T20918] IPVS: ftp: loaded support on port[0] = 21 14:16:26 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 640.495592][T20933] IPVS: ftp: loaded support on port[0] = 21 14:16:26 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 640.670818][T20913] IPVS: ftp: loaded support on port[0] = 21 14:16:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 640.829955][T20944] IPVS: ftp: loaded support on port[0] = 21 14:16:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:27 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 641.244843][T20957] IPVS: ftp: loaded support on port[0] = 21 14:16:30 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:30 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 644.269116][T20968] IPVS: ftp: loaded support on port[0] = 21 14:16:30 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) geteuid() recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:16:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:30 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:30 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() [ 644.410889][T20975] IPVS: ftp: loaded support on port[0] = 21 [ 644.432345][T20977] IPVS: ftp: loaded support on port[0] = 21 14:16:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 644.477016][T20984] IPVS: ftp: loaded support on port[0] = 21 14:16:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x14}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:31 executing program 0: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 645.249126][T21008] IPVS: ftp: loaded support on port[0] = 21 14:16:31 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:31 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x800, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r3}, 0x10) 14:16:31 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:31 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 645.906125][T21021] IPVS: ftp: loaded support on port[0] = 21 [ 645.929054][T21016] IPVS: ftp: loaded support on port[0] = 21 [ 645.933501][T21024] IPVS: ftp: loaded support on port[0] = 21 [ 646.197338][T21032] IPVS: ftp: loaded support on port[0] = 21 [ 646.498163][T21032] chnl_net:caif_netlink_parms(): no params data found [ 646.664374][T21032] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.680769][T21032] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.697229][T21032] device bridge_slave_0 entered promiscuous mode [ 646.709607][T21024] IPVS: ftp: loaded support on port[0] = 21 [ 646.717211][T21032] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.763940][T21032] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.789515][T21032] device bridge_slave_1 entered promiscuous mode [ 646.906238][T21032] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 646.929828][T21032] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 646.999712][T21032] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 647.030859][T21032] team0: Port device team_slave_0 added [ 647.055911][T21032] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 647.075312][T21032] team0: Port device team_slave_1 added [ 647.095884][T21032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 647.128372][T21032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 647.274472][T21032] device hsr_slave_0 entered promiscuous mode [ 647.349983][T21032] device hsr_slave_1 entered promiscuous mode [ 647.412953][T21032] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 647.420910][T21032] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 647.490183][T21032] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 647.635872][T21032] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 647.658671][T21032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 647.687300][T21032] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 647.719764][T21032] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 647.744084][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 647.771071][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 647.797338][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 647.822574][T21032] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 647.844940][T21032] 8021q: adding VLAN 0 to HW filter on device team0 [ 647.894531][T21032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 647.911443][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 647.920228][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 647.951838][ T2979] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.958913][ T2979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 647.994817][T21032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 648.020181][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 648.034637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 648.043590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 648.052132][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 648.059223][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 648.085253][T21032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 648.094792][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 648.107336][T21032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 648.122039][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 648.134926][T21032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 648.171633][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 648.180558][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 648.215070][T21032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 648.223598][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 648.240342][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 648.281868][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 648.293756][T21032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 648.311723][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 648.320250][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 648.344984][T21032] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 648.361699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 648.370218][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 648.394582][T21032] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 648.402217][T21032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 648.446815][T21032] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 648.495958][T21032] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 648.586649][T21042] IPVS: ftp: loaded support on port[0] = 21 14:16:34 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x61}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:34 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:16:34 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:34 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 648.844539][T21049] IPVS: ftp: loaded support on port[0] = 21 [ 648.870078][T21055] IPVS: ftp: loaded support on port[0] = 21 14:16:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x63}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 648.892987][T21053] IPVS: ftp: loaded support on port[0] = 21 14:16:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x68}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x71}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:36 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x73}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:36 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 650.667922][T21082] IPVS: ftp: loaded support on port[0] = 21 14:16:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 651.081659][T21092] IPVS: ftp: loaded support on port[0] = 21 [ 651.455748][T21092] chnl_net:caif_netlink_parms(): no params data found [ 651.468040][T21082] IPVS: ftp: loaded support on port[0] = 21 [ 651.626765][T21092] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.648663][T21092] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.676045][T21092] device bridge_slave_0 entered promiscuous mode [ 651.724331][T21092] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.735115][T21092] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.761668][T21092] device bridge_slave_1 entered promiscuous mode [ 651.847640][T21092] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 651.902919][T21092] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 652.000294][T21092] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 652.024427][T21092] team0: Port device team_slave_0 added [ 652.052943][T21092] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 652.074851][T21092] team0: Port device team_slave_1 added [ 652.142867][T21092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 652.151074][T21092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 652.344491][T21092] device hsr_slave_0 entered promiscuous mode [ 652.391582][T21092] device hsr_slave_1 entered promiscuous mode [ 652.535647][T21092] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 652.551774][T21092] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 652.624124][T21092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 652.781414][T21092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 652.824583][T21092] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 652.864681][T21092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 652.891396][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 652.899233][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 652.935362][T21092] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 652.951388][T21092] 8021q: adding VLAN 0 to HW filter on device team0 [ 652.992924][T21092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 653.000670][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 653.042193][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 653.050581][T19368] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.057745][T19368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.104573][T21092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 653.131499][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 653.139757][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 653.191770][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.200115][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.207232][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.284714][T21092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 653.301628][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 653.324867][T21092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 653.341531][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 653.376166][T21092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 653.391579][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 653.400411][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 653.454812][T21092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 653.471451][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 653.479699][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 653.512119][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 653.544883][T21092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 653.553039][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 653.591826][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 653.606495][T21092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 653.641498][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 653.652274][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 653.683663][T21092] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 653.690423][T21092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 653.755783][T21092] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 653.786617][T21092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 654.037518][T21104] IPVS: ftp: loaded support on port[0] = 21 14:16:40 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 654.175246][T21109] IPVS: ftp: loaded support on port[0] = 21 14:16:40 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 654.896822][T21116] IPVS: ftp: loaded support on port[0] = 21 14:16:41 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa8}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:41 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() 14:16:41 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 655.039079][T21121] IPVS: ftp: loaded support on port[0] = 21 14:16:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 655.080376][T21125] IPVS: ftp: loaded support on port[0] = 21 [ 655.145662][T21130] IPVS: ftp: loaded support on port[0] = 21 14:16:42 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0xffffffffffffff1e, 0x0}}], 0x400000000000250, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:42 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:16:42 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() 14:16:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x500}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:42 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 656.281102][T21147] IPVS: ftp: loaded support on port[0] = 21 [ 656.308817][T21149] IPVS: ftp: loaded support on port[0] = 21 [ 656.311615][T21146] IPVS: ftp: loaded support on port[0] = 21 14:16:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x600}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 656.348099][T21153] IPVS: ftp: loaded support on port[0] = 21 14:16:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:42 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() 14:16:42 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:16:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x900}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 656.775352][T21169] IPVS: ftp: loaded support on port[0] = 21 [ 656.824551][T21174] IPVS: ftp: loaded support on port[0] = 21 [ 657.108422][T21153] IPVS: ftp: loaded support on port[0] = 21 14:16:44 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:44 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() 14:16:44 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') 14:16:44 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x400400, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x40}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000340)={r3, 0xce, "abe87985932a3a57fd8039b3bfc3b45b0a90d50f370a738f6a0398babdad0713900097ec025d5fdd3cc05c3e2e1387f4aee52bbb51a3b1018a7bee6bf757f2a8de61330d1453be69d79a41f1ca86bcefec2001dd474e345159f3dbd537e27b6dd7b3a89b53afb0bac6243747ba6fc533e3f57dfa2bbd84ee9b91a1d292c2503b8384c680a3cc656183419cde30af9612140538763e23af6a20def0e7554eb6aca6b041a17c57dfcb979306c27ddb13fc1df0ad370947cfecaf104ab02d6a1e5b2d408ccf7a6a4e029636539c25e6"}, &(0x7f0000000440)=0xd6) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0x3f, 0x2, "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", 0x1e, 0x75e, 0x600000000000000, 0x9, 0x0, 0xff, 0x6}, r5}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:16:44 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000180)={0x2f, @multicast1, 0x4e23, 0x3, 'fo\x00', 0x20, 0x8, 0x6a}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x80000, 0xbc2) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e24, @rand_addr=0x80}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x40, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)='veth0_to_team\x00', 0x9, 0x0, 0x1ff}) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xe48, 0x10002) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000140)={0x2, 0xffffffffffffff9c}) [ 658.458861][T21199] IPVS: ftp: loaded support on port[0] = 21 [ 658.463571][T21192] IPVS: ftp: loaded support on port[0] = 21 14:16:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) close(r1) [ 658.550244][T21211] IPVS: ftp: loaded support on port[0] = 21 14:16:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1018}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 658.711160][T21221] IPVS: ftp: loaded support on port[0] = 21 14:16:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1400}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 658.807540][T21228] IPVS: set_ctl: invalid protocol: 47 224.0.0.1:20003 14:16:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:47 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:47 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000001c0), 0x4) close(r0) fcntl$setpipe(r1, 0x407, 0x8) pause() getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='trusted.overlay.opaque\x00', &(0x7f0000000280)=""/162, 0xa2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000480)={'veth1_to_hsr\x00', r3}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000540)={@mcast2}, &(0x7f0000000580)=0x14) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x82000003}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r5, 0x600, 0x70bd25, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r5, 0x2, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x6, @media='eth\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000004) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:16:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:47 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:47 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() 14:16:47 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x8) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x542) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000001c00)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) [ 660.937552][T21247] IPVS: ftp: loaded support on port[0] = 21 [ 660.962665][T21249] IPVS: ftp: loaded support on port[0] = 21 14:16:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 660.990296][T21253] IPVS: ftp: loaded support on port[0] = 21 [ 661.038174][T21259] IPVS: ftp: loaded support on port[0] = 21 14:16:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:47 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:47 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() [ 661.381072][T21253] IPVS: ftp: loaded support on port[0] = 21 14:16:47 executing program 5: mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$void(0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_SET(0x0, 0x1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="000225bd7000fedbdf250200000004000500080001004e240000080003"], 0x1}}, 0x24048010) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 661.513654][T21285] IPVS: ftp: loaded support on port[0] = 21 [ 661.546754][T21292] IPVS: ftp: loaded support on port[0] = 21 [ 664.228043][ T8551] device bridge_slave_1 left promiscuous mode [ 664.251487][ T8551] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.292532][ T8551] device bridge_slave_0 left promiscuous mode [ 664.298703][ T8551] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.363548][ T8551] device bridge_slave_1 left promiscuous mode [ 664.369715][ T8551] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.412418][ T8551] device bridge_slave_0 left promiscuous mode [ 664.418634][ T8551] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.684622][ T8551] device hsr_slave_1 left promiscuous mode [ 664.727097][ T8551] device hsr_slave_0 left promiscuous mode [ 664.767478][ T8551] team0 (unregistering): Port device team_slave_1 removed [ 664.783545][ T8551] team0 (unregistering): Port device team_slave_0 removed [ 664.797689][ T8551] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 664.848074][ T8551] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 664.949746][ T8551] bond0 (unregistering): Released all slaves [ 665.146712][ T8551] device hsr_slave_1 left promiscuous mode [ 665.207490][ T8551] device hsr_slave_0 left promiscuous mode [ 665.248181][ T8551] team0 (unregistering): Port device team_slave_1 removed [ 665.260589][ T8551] team0 (unregistering): Port device team_slave_0 removed [ 665.273370][ T8551] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 665.346057][ T8551] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 665.437872][ T8551] bond0 (unregistering): Released all slaves 14:16:51 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 665.767705][T21303] IPVS: ftp: loaded support on port[0] = 21 14:16:52 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:16:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:52 executing program 5: mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$void(0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_SET(0x0, 0x1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="000225bd7000fedbdf250200000004000500080001004e240000080003"], 0x1}}, 0x24048010) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 14:16:52 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:52 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() 14:16:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 666.275872][T21311] IPVS: ftp: loaded support on port[0] = 21 [ 666.289729][T21315] IPVS: ftp: loaded support on port[0] = 21 [ 666.316198][T21319] IPVS: ftp: loaded support on port[0] = 21 14:16:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000002, 0xc) write(r0, &(0x7f0000000000)="1f0000001000fffffd3b54c8f61000000701000b000300000025d103f7ce00", 0x1f) 14:16:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 666.500271][T21332] netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. [ 666.530950][T21334] netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. 14:16:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6100}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x8c) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2f6) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 14:16:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 667.086322][T21329] IPVS: ftp: loaded support on port[0] = 21 14:16:54 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 668.552794][T21359] IPVS: ftp: loaded support on port[0] = 21 14:16:58 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000040)={0x3f, 0x1, 0xfffffffeffffffff, {0x77359400}, 0x4, 0x7fffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10048}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x150, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7c}]}, @TIPC_NLA_MEDIA={0x130, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2e8c}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4d4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc735}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x14}, 0x8004) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:16:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x8c) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2f6) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 14:16:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:58 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:16:58 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() 14:16:58 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 672.765902][T21370] IPVS: ftp: loaded support on port[0] = 21 [ 672.792491][T21372] IPVS: ftp: loaded support on port[0] = 21 14:16:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 672.827011][T21377] IPVS: ftp: loaded support on port[0] = 21 [ 672.857876][T21380] IPVS: ftp: loaded support on port[0] = 21 14:16:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7100}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:59 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:16:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 673.169909][T21399] IPVS: ftp: loaded support on port[0] = 21 14:16:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7400}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 673.625407][T21380] IPVS: ftp: loaded support on port[0] = 21 14:16:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:16:59 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() 14:17:00 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x101080, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000240)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x4000000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f00000000c0)="c49b26f3a1b72ecc15db373a3b6aaa1c9a52626a52dc66b2a9534d23a9563a620de0a620664552d5c327587adffe5a96b157f3bb2967b168aadca8cbf6a822fbb3ed6d4c10c66a47b32c2e413bae5f5dff2f9c5c9c7bed8ebb0fe18948d206f42f0e2c2dd0879e9f3b289cf2e73079a10a072880a0369b35b9cc09ef4f3698721a6546661f367845bb7967755747be6cdb925c1e135eb7290acd0b4bf47f7dd5cc205dc1582f49c5ce2c68eac00df17d69d004d8d8bf1c00082ecc6cd772a8ec022e") r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) connect$bt_rfcomm(r4, &(0x7f0000000040)={0x1f, {0x100000001, 0x100000001, 0xabd, 0x25, 0x1, 0x7fff}, 0x5c95}, 0xa) accept(r3, 0x0, &(0x7f0000000080)) [ 673.937071][T21421] IPVS: ftp: loaded support on port[0] = 21 [ 674.037286][T21426] IPVS: ftp: loaded support on port[0] = 21 14:17:01 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:17:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x8c) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2f6) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 14:17:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:01 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:01 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) prctl$PR_SET_UNALIGN(0x6, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:01 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() 14:17:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff0f}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 675.882243][T21443] IPVS: ftp: loaded support on port[0] = 21 [ 675.888291][T21452] IPVS: ftp: loaded support on port[0] = 21 [ 675.904533][T21444] IPVS: ftp: loaded support on port[0] = 21 [ 675.919806][T21447] IPVS: ftp: loaded support on port[0] = 21 14:17:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x96f37}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa8a90}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 676.286951][T21443] IPVS: ftp: loaded support on port[0] = 21 14:17:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:02 executing program 3: clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/hwrng\x00', 0x2400, 0x0) recvfrom$x25(r0, &(0x7f0000001f00)=""/148, 0x94, 0x100, &(0x7f0000001fc0)={0x9, @remote={[], 0x1}}, 0x12) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 14:17:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 676.664799][T21480] IPVS: ftp: loaded support on port[0] = 21 [ 677.403793][T21485] IPVS: ftp: loaded support on port[0] = 21 14:17:04 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:17:04 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:04 executing program 2: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:17:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x8c) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2f6) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 14:17:04 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = dup3(r1, r0, 0x80000) openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x80000001, 0x6, 0x1, 0x4, 0xf40, 0x9, 0x9, 0x2, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r4, 0x4, 0x30}, &(0x7f0000000140)=0xc) 14:17:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 678.324860][T21502] IPVS: ftp: loaded support on port[0] = 21 [ 678.328068][T21506] IPVS: ftp: loaded support on port[0] = 21 [ 678.337981][T21508] IPVS: ftp: loaded support on port[0] = 21 [ 678.364450][T21511] IPVS: ftp: loaded support on port[0] = 21 14:17:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:05 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 679.194223][T21543] IPVS: ftp: loaded support on port[0] = 21 14:17:07 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 681.655678][T21551] IPVS: ftp: loaded support on port[0] = 21 14:17:09 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 14:17:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:09 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', r3}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x36fbc959, 0x0, 0x82}, 0xc) 14:17:09 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:09 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:09 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x3ffffffc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = shmget$private(0x0, 0x1000, 0x1002, &(0x7f0000ffe000/0x1000)=nil) r3 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x7, 0x800) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000000)=""/123) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0xc2800) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f0000000180)={0x1, 0x0, {0x55, 0x7, 0x474, {0x3, 0x5}, {0xfa53}, @period={0x0, 0x7, 0x7, 0x7ff, 0x4000, {0x17, 0x899, 0xffffffffffffffb4, 0x9a0}, 0x7, &(0x7f0000000140)=[0x93, 0xffffffff80000000, 0x49, 0x4, 0x9, 0x257, 0x1]}}, {0x52, 0x5c6, 0x5, {0x3, 0x8}, {0x6, 0x6}, @ramp={0xa511, 0x7f, {0xe79b, 0x9, 0xfff, 0x8}}}}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000100)) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000400)=""/100) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r5, 0x20, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x19, 0x317dc616, @udp='udp:syz1\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xa) [ 683.068342][T21557] IPVS: ftp: loaded support on port[0] = 21 14:17:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 683.125273][T21565] IPVS: ftp: loaded support on port[0] = 21 14:17:09 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 683.210635][T21575] IPVS: ftp: loaded support on port[0] = 21 14:17:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:09 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:09 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', r3}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x36fbc959, 0x0, 0x82}, 0xc) 14:17:09 executing program 2: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 683.654452][T21598] IPVS: ftp: loaded support on port[0] = 21 [ 683.693354][T21602] IPVS: ftp: loaded support on port[0] = 21 14:17:10 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 14:17:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:10 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:10 executing program 2: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:10 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x11b080, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x60000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x40, 0x0) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000180)={0x0, 0x3, [{r3, 0x0, 0xfffffffffffff000, 0x8000}, {r4, 0x0, 0x1000000}, {r5, 0x0, 0xfffff000, 0x1000000}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x9978) [ 684.024388][T21616] IPVS: ftp: loaded support on port[0] = 21 [ 684.028939][T21621] IPVS: ftp: loaded support on port[0] = 21 [ 684.042530][T21618] IPVS: ftp: loaded support on port[0] = 21 14:17:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 684.107500][T21628] IPVS: ftp: loaded support on port[0] = 21 14:17:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:10 executing program 5: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:17:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x14000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 684.577567][T21644] IPVS: ftp: loaded support on port[0] = 21 14:17:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x18100000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:10 executing program 2: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 684.808033][T21618] IPVS: ftp: loaded support on port[0] = 21 14:17:11 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 14:17:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 685.010999][T21660] IPVS: ftp: loaded support on port[0] = 21 [ 685.026858][T21665] IPVS: ftp: loaded support on port[0] = 21 14:17:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x376f0900}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:12 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:12 executing program 5: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:12 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x14681, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="00a2e57d0871195a2ee2b0743ad1841c1b32f0fb7929e0db34943de7c14a1b5c2e28a8eae4ab010028ad1a927e8781fa"], 0x1) pause() r3 = getpgid(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r1, &(0x7f0000000100)={r2, r1, 0x5}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:17:12 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:17:12 executing program 2: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 686.476451][T21677] IPVS: ftp: loaded support on port[0] = 21 [ 686.492682][T21684] IPVS: ftp: loaded support on port[0] = 21 [ 686.505815][T21686] IPVS: ftp: loaded support on port[0] = 21 [ 686.512215][T21690] IPVS: ftp: loaded support on port[0] = 21 [ 686.560463][T21680] IPVS: ftp: loaded support on port[0] = 21 14:17:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x61000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 686.958937][T21684] IPVS: ftp: loaded support on port[0] = 21 14:17:15 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x63000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:15 executing program 4: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000000)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) tkill(r0, 0x20000000000000b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xf9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:17:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:15 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x24048010) msgget(0xffffffffffffffff, 0x0) 14:17:15 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000a80)=ANY=[@ANYBLOB="66696c7465720000000000000000000008000000000000000000000000000000070000000400000080040000580200004001000040010000984300009803000098030000040000008d5a4f3e1332c4873a0d57f6808406625810c2dbaa478b006bc24f6a77b6468625ec3be68bbf85bb2179b96739ce771d3c6e9a3f86bf940ecb80357b485b9df78b906f626e51ae2ea50e2e0041153cc48536682deba42626", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x4d0) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 689.895486][T21730] IPVS: ftp: loaded support on port[0] = 21 14:17:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x68000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:16 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:16 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), 0x4) 14:17:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001380)}, 0x0) 14:17:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 690.184502][T21760] IPVS: ftp: loaded support on port[0] = 21 14:17:16 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x20042, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x14, 0x11, 0x1, {0x8, 0x4, 0x5}}, 0x14) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x14000400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x92, 0x30000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000040)={{0x3, 0x3, 0x8001, 0x3, 0x101}, 0x92, 0x8}) close(r1) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:17:16 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000400)={&(0x7f0000000480)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "71b62623d74821a2"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x7, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "75abc64b7a58a964"}}, 0x48}}, 0x0) 14:17:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x71000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:16 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create(0x20) clock_gettime(0x7, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x73000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:18 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:18 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$admmidi(&(0x7f0000002ac0)='/dev/admmidi#\x00', 0x1, 0x480040) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002b40)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000002e80)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002b80)={0x298, r4, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa397}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x428f442f}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x7d171ee3}, 0xfffffffffffffff9}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb60}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x99}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xffffffff, @local, 0x101}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @mcast2, 0xbde}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e71}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffa1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x38d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x106f244}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x298}}, 0x40800) 14:17:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:21 executing program 4: 14:17:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:21 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:21 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x420100, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000100)={0xa1, 0x4, 0xfff, 'queue1\x00'}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:17:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x908a0a00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:22 executing program 4: [ 695.934640][T21870] IPVS: ftp: loaded support on port[0] = 21 [ 695.936153][T21865] IPVS: ftp: loaded support on port[0] = 21 14:17:22 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9cffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:22 executing program 4: 14:17:22 executing program 0: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:22 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9fffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:22 executing program 4: [ 696.264944][T21894] IPVS: ftp: loaded support on port[0] = 21 14:17:24 executing program 4: 14:17:24 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa8000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:24 executing program 0: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:24 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000380)={0x6, 0x800000000000, 0x8}) getgroups(0x5, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff]) r4 = getegid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x5, 0x1188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, &(0x7f0000000040), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x40, 0x6000, 'erspan0\x00', 'veth1\x00', 'ip_vti0\x00', 'gretap0\x00', @random="98a072a06690", [0xff, 0x0, 0x0, 0xff, 0x9fe5106ccf71c6a0, 0xff], @link_local, [0xff, 0x0, 0x0, 0xff, 0xff], 0x148, 0x148, 0x198, [@physdev={'physdev\x00', 0x70, {{'rose0\x00', {0xff}, 'veth0_to_hsr\x00'}}}, @time={'time\x00', 0x18, {{0x2, 0xf3, 0x7db3, 0x970d, 0x8, 0x6, 0x1}}}]}}, @common=@log={'log\x00', 0x28, {{0x81, "77c0f21720836a67a462934020a1c44d6797b0c35b65eda111d84046336f", 0x4}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x1d, 0x2, 0x22eb, 'lapb0\x00', 'team_slave_1\x00', 'lapb0\x00', 'vlan0\x00', @dev={[], 0xd}, [0x0, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff], 0x990, 0xa18, 0xa68, [@rateest={'rateest\x00', 0x48, {{'veth1_to_bridge\x00', 'vcan0\x00', 0x8, 0x0, 0x8, 0x4, 0x1f, 0x2, 0x400, 0x9}}}, @among={'among\x00', 0x888, {{0x3, 0x3, 0x1, {[0x200, 0x100000001, 0x8997, 0x6, 0xffffffffffffffc0, 0x1, 0x9, 0x0, 0x1, 0x1, 0x1, 0x80, 0x10001, 0x7fff, 0xfffffffffffffffb, 0x2, 0x9, 0x7, 0x3, 0x3, 0x0, 0x6, 0xfffffffffffffffb, 0x1ff, 0xffffffffffffff2d, 0x3e29, 0xefb3, 0x10000, 0x7, 0x0, 0x2, 0x1000, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x2, 0x5, 0x2, 0x8, 0x0, 0xa45, 0x400, 0x0, 0x3, 0x4, 0x12c5, 0x7fffffff, 0x7, 0x7, 0x2, 0x8, 0x3, 0xc087, 0x2, 0x0, 0x2cc, 0x0, 0x1f, 0x5, 0x9, 0x7f, 0x5, 0x3ff, 0x7, 0x1, 0xb69d, 0x6, 0x8001, 0x9, 0xce, 0xaa75, 0x9035, 0x6, 0x7, 0x2, 0x1ee, 0x8, 0x4, 0x5, 0x7, 0x9, 0x6, 0x5, 0xfffffffffffff801, 0x8, 0x2, 0x2, 0x7fff, 0x6, 0x6, 0x40, 0x100000001, 0x7fffffff, 0x1, 0x4, 0x72, 0x800, 0xcd7, 0x7fff, 0x6, 0x2, 0x91, 0x100000001, 0x80, 0x5, 0x100, 0x2c2, 0x9, 0x8, 0x4, 0x6b45, 0x40, 0x400, 0x8, 0x4, 0x2, 0x1b800000000, 0x5, 0x9, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x80000000, 0x800, 0xd4e, 0x4, 0x5, 0x6, 0x80, 0x100, 0x4, 0x5, 0x100000000, 0x0, 0x5, 0x6, 0x9, 0x30, 0xb7c9, 0x915a, 0x7f, 0x2, 0xa07, 0x5f, 0x200, 0x2, 0x1ff, 0x4, 0x8, 0x6, 0x108d, 0x8, 0x7, 0xffffffffffffffff, 0x5, 0x8, 0x2, 0xfffffffffffffffb, 0x1, 0xffffffffffffffe1, 0x3f, 0x0, 0x3, 0xffffffff, 0x7, 0x439, 0x5, 0x8001, 0x13cd, 0x7, 0x7, 0xbe1, 0x1, 0x200, 0x4404, 0x8, 0x80, 0x6, 0x0, 0xe76, 0x1ff, 0xfffffffffffffffd, 0xff, 0xfffffffffffffe01, 0x4, 0x2, 0x400, 0xd2b9, 0xb, 0x3, 0x351, 0xfff, 0x2, 0x2000000000000, 0x0, 0xffffffffffff0000, 0x4, 0x5a8, 0xffffffffffff123d, 0x8, 0x1f, 0x7, 0x4ff, 0x2, 0x5, 0x1, 0xffffffff, 0x6, 0x8, 0x78c1, 0x6, 0x6, 0x7fffffff, 0x8, 0x4, 0x101, 0x8, 0x7, 0xbc9, 0x5, 0x6, 0x100000000, 0x9, 0x9, 0x7a, 0x0, 0xdd, 0x8, 0x9, 0x5f8, 0x1ff, 0xc4, 0x6, 0x5, 0x0, 0x8000, 0x100000001, 0x1, 0x7, 0x28000000000000, 0x2, 0x1, 0x1ff, 0x3, 0xfffffffffffffe00, 0xffffffff, 0x80000000, 0xfff, 0x695160d8, 0x0, 0x1400000000, 0x5f3, 0xffffffffffff0000, 0x10001, 0x6], 0x7, [{[0x4, 0x8], @multicast1}, {[0x7, 0x5], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x25, 0x8fd], @multicast2}, {[0x7, 0x4], @dev={0xac, 0x14, 0x14, 0x13}}, {[0x5, 0x10001], @multicast2}, {[0x400, 0x100000001], @remote}, {[0x1, 0xffffffffffffff81], @initdev={0xac, 0x1e, 0x1, 0x0}}]}, {[0x5, 0x1000, 0x5, 0x7ff, 0x4, 0x4, 0xfffffffffffff001, 0x1, 0x9650, 0xf73, 0x80000000, 0x400, 0xffffffffac4d4550, 0x9, 0x1cb7, 0x0, 0x7, 0x5, 0x40, 0x100000000, 0x2, 0x1, 0x4, 0x0, 0xf7, 0x80, 0x2, 0x800, 0x7, 0x40, 0x4, 0x10000, 0x2, 0x4, 0x8, 0x3c8b131e, 0x10000, 0x7, 0x9, 0xfff, 0x40, 0x1, 0x80000001, 0x4, 0x20, 0x100000000, 0x7, 0x40, 0xce38, 0x80000001, 0xb3, 0x3, 0xe81, 0x3, 0x3, 0x100010000, 0x1, 0x0, 0x0, 0x8, 0x8, 0x1, 0x9ca, 0x9, 0x3, 0x0, 0x5, 0x6, 0x0, 0x9, 0x10da, 0x3, 0x7fff, 0xfcf7, 0x8, 0x20, 0x6, 0x1, 0x6, 0x2, 0x8, 0x4, 0x4, 0x200, 0x3, 0x2f157c1b, 0x9, 0x3f, 0x0, 0x8, 0x9, 0x7ff, 0x8, 0x7fffffff, 0x1ff, 0x9, 0x101, 0x0, 0x7, 0x4, 0x5, 0x2, 0x10000, 0x7f, 0x784, 0x631, 0x6, 0x7, 0x8000, 0x80, 0xff, 0x8001, 0x80000001, 0x363, 0x7, 0x8, 0x7, 0x0, 0x81, 0x6, 0x4, 0xbbe, 0x6, 0x9, 0x4, 0x40, 0x3f, 0x6, 0x8, 0xfff, 0xd3d, 0x7, 0x0, 0x74, 0x7, 0xffffffffffffffff, 0x7cd, 0x8, 0xfffffffffffffff9, 0x20, 0x476f, 0x5, 0x100000000, 0x9, 0x9, 0x0, 0x8, 0x9, 0x2, 0x1, 0x8, 0x8, 0x3, 0x8, 0x401, 0x801, 0x20, 0x80000000, 0xffff, 0xff, 0x40, 0x9, 0x6, 0x6, 0x2, 0x80000000, 0x2, 0x0, 0x260, 0xfffffffffffff001, 0x4, 0x0, 0x0, 0x80000001, 0xfff, 0x5, 0x7, 0xffff, 0x46, 0x9, 0x7, 0x4, 0x7, 0x8, 0x9, 0x7248, 0x5, 0x7, 0x20, 0x5, 0x7, 0xa7, 0x5, 0xc000000000000000, 0xffff, 0x2, 0x7f, 0x0, 0xa022, 0x9, 0x4, 0x0, 0x301, 0x20, 0x80000000, 0x0, 0x7, 0x15a, 0xfffffffffffffffc, 0x5, 0x6, 0x81, 0x3, 0x6, 0x0, 0x4e19, 0x1, 0xfffffffffffffffd, 0x2, 0x0, 0x9, 0x9846, 0x1ffe000000000, 0x1, 0x1, 0x2, 0xfffffffffffffff7, 0x20, 0x6, 0x8, 0x4, 0x5fde19b7, 0x8, 0x82db, 0x1000, 0x100000000, 0x8, 0x10000, 0x3, 0x81, 0x7ff, 0x401, 0x8c, 0x4, 0x4, 0x400, 0xffff, 0x7f, 0x9, 0x40, 0x1000, 0x5d1a, 0x80000000, 0xfff, 0x2, 0x8, 0x7], 0x2, [{[0x2, 0xce5c], @multicast1}, {[0x7, 0xffffffff80000001], @local}]}}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xffffffffffffffff}}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x80, 0x8}}}]}, @common=@log={'log\x00', 0x28, {{0x401, "8f11e4e214700fb2a52dab441f1bb06b5a35d84b9dae96155547468bffe4", 0x5}}}}, {{{0x3, 0x40, 0xf5, 'eql\x00', 'ipddp0\x00', 'vcan0\x00', 'batadv0\x00', @dev={[], 0x19}, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x70, 0x108, 0x238}, [@common=@ERROR={'ERROR\x00', 0x20, {"e019ca526efddc639c88eec8c7543eeeaecc450f5524e96cc61c14da0436"}}, @common=@log={'log\x00', 0x28, {{0x1000, "024a7e60aab4f84fc7870463fce4963421a52a73b0fb4dfd2f8d23d0f643"}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'system_u:object_r:setrans_initrc_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{{{0x11, 0x28, 0x8809, 'gretap0\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', 'nr0\x00', @dev={[], 0x13}, [0xff, 0x0, 0xff], @random="cc6bec351b3e", [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x100, 0x100, 0x130, [@ipvs={'ipvs\x00', 0x28, {{@ipv4=@local, [0xffffffff, 0x0, 0xffffffff, 0xffffffff], 0x4e22, 0x6c, 0x6, 0x4e23, 0x20, 0x21}}}, @owner={'owner\x00', 0x18, {{r1, r2, r3, r4, 0x6, 0x3}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}}, {{{0xf, 0xa, 0x8eff, 'veth0_to_team\x00', 'bond_slave_1\x00', 'veth0_to_bond\x00', 'ip_vti0\x00', @random="854a8d565a81", [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x24}, [0xff, 0xff, 0xff], 0xe0, 0x160, 0x190, [@devgroup={'devgroup\x00', 0x18, {{0x0, 0x7fffffff, 0x7, 0x100, 0xd650}}}, @connlabel={'connlabel\x00', 0x8, {{0xffffffffffffffbf, 0x3}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x2, 0x7}}}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}]}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}]}]}, 0x1200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000003c0)={0x306, 0x4, 0x1, {}, 0x8, 0x3}) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r6, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r5) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) [ 697.999818][T21917] IPVS: ftp: loaded support on port[0] = 21 14:17:24 executing program 4: 14:17:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe4ffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 698.082925][T21930] QAT: Invalid ioctl 14:17:24 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 698.122330][T21930] QAT: Invalid ioctl [ 698.166825][T21930] IPVS: ftp: loaded support on port[0] = 21 14:17:24 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000100)=0x100, 0xf3) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000200)=0x5, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xfcdf}], 0x1) 14:17:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 698.365707][T21948] raw_sendmsg: syz-executor4 forgot to set AF_INET. Fix it! 14:17:26 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff0f0000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x4004510f, 0x0) 14:17:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 700.583111][T21972] IPVS: ftp: loaded support on port[0] = 21 14:17:27 executing program 0: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:27 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff8000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'team_slave_1\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="3b000000020000000000002fcd000000de3af3ac"]}) 14:17:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:27 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() signalfd4(r0, &(0x7f0000000000)={0x691}, 0x8, 0x80800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff85}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 701.057588][T21988] IPVS: ftp: loaded support on port[0] = 21 14:17:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x2, &(0x7f0000000240)='%\x00'}, 0x30) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000340)=""/108) perf_event_open(0x0, 0x0, 0x0, r0, 0xa) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x1100, 0x0, 0xffffff7f00000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0xf6c) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000001640)) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x8048ae66, &(0x7f00000000c0)={[{0x0, 0x1, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x3}], 0x4ea}) 14:17:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 701.238589][T21996] IPVS: ftp: loaded support on port[0] = 21 14:17:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff9c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:30 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffe4}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:17:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x2, &(0x7f0000000240)='%\x00'}, 0x30) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f0000000340)=""/108) perf_event_open(0x0, 0x0, 0x0, r0, 0xa) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x1100, 0x0, 0xffffff7f00000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0xf6c) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000001640)) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x8048ae66, &(0x7f00000000c0)={[{0x0, 0x1, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x3}], 0x4ea}) [ 704.115862][T22046] IPVS: ftp: loaded support on port[0] = 21 14:17:30 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/134, 0x86}, {&(0x7f0000000100)=""/1, 0x1}, {&(0x7f0000000140)=""/141, 0x8d}, {&(0x7f0000000200)=""/192, 0xc0}, {&(0x7f00000002c0)=""/198, 0xc6}], 0x5, 0x0) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:30 executing program 4: memfd_create(0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x0, 0x100000000, 0x0, 0x9}]}, 0x10) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) connect(r1, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000001c0)) 14:17:30 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 704.542041][T22059] IPVS: ftp: loaded support on port[0] = 21 [ 704.664473][T22068] IPVS: ftp: loaded support on port[0] = 21 14:17:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:30 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:30 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:17:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 704.949563][T22079] IPVS: ftp: loaded support on port[0] = 21 14:17:31 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 705.185946][T22094] IPVS: ftp: loaded support on port[0] = 21 14:17:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:31 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:32 executing program 4 (fault-call:6 fault-nth:0): syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:32 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x1, 0x3f, 0x9, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:32 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:32 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:17:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 706.144556][T22126] IPVS: ftp: loaded support on port[0] = 21 14:17:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:32 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 706.328752][T22148] IPVS: ftp: loaded support on port[0] = 21 14:17:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:32 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400100, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 706.623647][T22173] IPVS: ftp: loaded support on port[0] = 21 [ 706.999200][T22162] FAULT_INJECTION: forcing a failure. [ 706.999200][T22162] name fail_futex, interval 1, probability 0, space 0, times 0 [ 707.012899][T22162] CPU: 1 PID: 22162 Comm: syz-executor4 Not tainted 5.0.0-rc3-next-20190122 #17 [ 707.021935][T22162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.031996][T22162] Call Trace: [ 707.035288][T22162] dump_stack+0x1db/0x2d0 [ 707.039603][T22162] ? dump_stack_print_info.cold+0x20/0x20 [ 707.045327][T22162] should_fail.cold+0xa/0x14 [ 707.049942][T22162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 707.055739][T22162] ? mark_held_locks+0xf0/0xf0 [ 707.060485][T22162] ? __lock_acquire+0x572/0x4a10 [ 707.065444][T22162] ? print_usage_bug+0xd0/0xd0 [ 707.070222][T22162] get_futex_key+0x115f/0x2070 [ 707.074971][T22162] ? __lock_acquire+0x572/0x4a10 [ 707.079888][T22162] ? check_noncircular+0x20/0x20 [ 707.084817][T22162] ? mark_wake_futex+0x250/0x250 [ 707.089756][T22162] ? mark_held_locks+0xf0/0xf0 [ 707.094501][T22162] ? rcu_read_unlock_special+0x380/0x380 [ 707.100114][T22162] ? rcu_softirq_qs+0x20/0x20 [ 707.104785][T22162] ? print_usage_bug+0xd0/0xd0 [ 707.109540][T22162] ? print_usage_bug+0xd0/0xd0 [ 707.114326][T22162] ? mark_held_locks+0xf0/0xf0 [ 707.119076][T22162] ? check_noncircular+0x20/0x20 [ 707.124002][T22162] ? print_usage_bug+0xd0/0xd0 [ 707.128752][T22162] ? check_noncircular+0x20/0x20 [ 707.133690][T22162] ? __lock_acquire+0x572/0x4a10 [ 707.138612][T22162] ? mark_held_locks+0xf0/0xf0 [ 707.143390][T22162] ? print_usage_bug+0xd0/0xd0 [ 707.148149][T22162] ? print_usage_bug+0xd0/0xd0 [ 707.152908][T22162] futex_wake+0x1a4/0x7b0 [ 707.157229][T22162] ? __lock_acquire+0x572/0x4a10 [ 707.162159][T22162] ? get_futex_key+0x2070/0x2070 [ 707.167085][T22162] ? print_usage_bug+0xd0/0xd0 [ 707.171837][T22162] ? __lock_acquire+0x572/0x4a10 [ 707.176766][T22162] ? mark_held_locks+0xf0/0xf0 [ 707.181526][T22162] do_futex+0x371/0x2910 [ 707.185757][T22162] ? mark_held_locks+0xf0/0xf0 [ 707.190501][T22162] ? __lock_acquire+0x572/0x4a10 [ 707.195418][T22162] ? find_held_lock+0x35/0x120 [ 707.200161][T22162] ? add_lock_to_list.isra.0+0x450/0x450 [ 707.205775][T22162] ? exit_robust_list+0x290/0x290 [ 707.210779][T22162] ? __delayacct_add_tsk+0x65f/0x790 [ 707.216059][T22162] ? add_lock_to_list.isra.0+0x450/0x450 [ 707.221677][T22162] ? __might_fault+0x12b/0x1e0 [ 707.226428][T22162] ? find_held_lock+0x35/0x120 [ 707.231168][T22162] ? __might_fault+0x12b/0x1e0 [ 707.235914][T22162] ? __might_fault+0x12b/0x1e0 [ 707.240654][T22162] ? find_held_lock+0x35/0x120 [ 707.245400][T22162] ? __might_fault+0x12b/0x1e0 [ 707.250145][T22162] ? lock_acquire+0x1db/0x570 [ 707.254818][T22162] ? lock_downgrade+0xc40/0xc40 [ 707.259663][T22162] ? lock_release+0xc40/0xc40 [ 707.264351][T22162] mm_release+0x453/0x5d0 [ 707.268680][T22162] ? mm_access+0x150/0x150 [ 707.273110][T22162] ? _raw_spin_unlock_irq+0x5e/0x90 [ 707.278301][T22162] ? acct_collect+0x699/0x860 [ 707.282972][T22162] do_exit+0x4cb/0x2b60 [ 707.287136][T22162] ? mm_update_next_owner+0x970/0x970 [ 707.292495][T22162] ? page_alloc_cpu_dead+0x30/0x30 [ 707.297595][T22162] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 707.303435][T22162] ? __free_pages_ok+0x8bc/0x1520 [ 707.308454][T22162] ? __free_pages_ok+0x8bc/0x1520 [ 707.313470][T22162] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.318762][T22162] ? mark_held_locks+0xf0/0xf0 [ 707.323521][T22162] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 707.329751][T22162] ? kernel_poison_pages+0x17f/0x2c0 [ 707.335040][T22162] ? free_one_page+0x1770/0x1770 [ 707.339966][T22162] ? add_lock_to_list.isra.0+0x450/0x450 [ 707.345579][T22162] ? memset+0x32/0x40 [ 707.349537][T22162] ? __dequeue_signal+0xeb/0x730 [ 707.354469][T22162] ? get_signal+0x966/0x19c0 [ 707.359050][T22162] ? find_held_lock+0x35/0x120 [ 707.363798][T22162] ? get_signal+0x966/0x19c0 [ 707.368395][T22162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.374633][T22162] ? _raw_spin_unlock_irq+0x28/0x90 [ 707.379812][T22162] ? _raw_spin_unlock_irq+0x28/0x90 [ 707.385000][T22162] do_group_exit+0x177/0x430 [ 707.389578][T22162] ? trace_hardirqs_off_caller+0x300/0x300 [ 707.395382][T22162] ? __ia32_sys_exit+0x50/0x50 [ 707.400124][T22162] get_signal+0x8b7/0x19c0 [ 707.404546][T22162] ? ptrace_notify+0x130/0x130 [ 707.409295][T22162] ? __switch_to_asm+0x34/0x70 [ 707.414049][T22162] ? __bpf_trace_sched_wake_idle_without_ipi+0x10/0x10 [ 707.420883][T22162] ? __switch_to_asm+0x34/0x70 [ 707.425621][T22162] ? __switch_to_asm+0x40/0x70 [ 707.430361][T22162] ? __switch_to_asm+0x34/0x70 [ 707.435108][T22162] ? __switch_to_asm+0x34/0x70 [ 707.439850][T22162] ? __switch_to_asm+0x34/0x70 [ 707.444600][T22162] ? __switch_to_asm+0x34/0x70 [ 707.449351][T22162] ? __switch_to_asm+0x40/0x70 [ 707.454105][T22162] ? __switch_to_asm+0x34/0x70 [ 707.458860][T22162] ? __switch_to_asm+0x40/0x70 [ 707.463615][T22162] do_signal+0x91/0x1ea0 [ 707.467850][T22162] ? pci_mmcfg_check_reserved+0x170/0x170 [ 707.473564][T22162] ? setup_sigcontext+0x7d0/0x7d0 [ 707.478582][T22162] ? exit_to_usermode_loop+0x98/0x3b0 [ 707.483946][T22162] ? exit_to_usermode_loop+0x98/0x3b0 [ 707.489333][T22162] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.494613][T22162] ? trace_hardirqs_off_caller+0x300/0x300 [ 707.500409][T22162] ? schedule+0x108/0x350 [ 707.504726][T22162] ? do_syscall_64+0x8c/0x800 [ 707.509401][T22162] exit_to_usermode_loop+0x2f7/0x3b0 [ 707.514670][T22162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.520712][T22162] ? syscall_trace_enter+0x12a0/0x12a0 [ 707.526151][T22162] ? __ia32_sys_pause+0x8b/0x140 [ 707.531064][T22162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.537296][T22162] ? __ia32_sys_pause+0xf5/0x140 [ 707.542240][T22162] do_syscall_64+0x696/0x800 [ 707.546822][T22162] ? syscall_return_slowpath+0x5f0/0x5f0 [ 707.552444][T22162] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 707.558155][T22162] ? __switch_to_asm+0x34/0x70 [ 707.562912][T22162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 707.568452][T22162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.574320][T22162] RIP: 0033:0x458099 [ 707.578193][T22162] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:17:33 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c12") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:33 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x500000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:33 executing program 3: clone(0xeffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x1, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14, 0x80800) fstat(0xffffffffffffff9c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@rand_addr=0xb82, @in=@empty, 0x4e22, 0x3, 0x4e24, 0x0, 0x2, 0x20, 0x80, 0x21, r1, r2}, {0x3a9b, 0x1, 0x5, 0x7fffffff, 0x8, 0x7, 0x1000, 0xa7}, {0x10000, 0x7, 0xc0}, 0x3f, 0x6e6bbd, 0x3, 0x0, 0x0, 0x2}, {{@in6=@local, 0x4d2, 0xff}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3504, 0x4, 0x3, 0xffffffff, 0x100000001, 0x400, 0x4}}, 0xe8) socketpair$unix(0x1, 0x4000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000240)=""/230, 0xe6) close(r3) pause() r5 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xda, 0x200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000090}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="1ad30000", @ANYRES16=r6, @ANYBLOB="000228bd7000fddbd7250100000000000000024100000014001369623a69703667726574617030000000"], 0x30}}, 0x40) socketpair$unix(0x1, 0x44003ffff9, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x40) 14:17:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)) tkill(r1, 0x1000000000015) [ 707.597775][T22162] RSP: 002b:00007f8834ec8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000022 [ 707.606160][T22162] RAX: fffffffffffffdfe RBX: 00007f8834ec8c90 RCX: 0000000000458099 [ 707.614114][T22162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 707.622076][T22162] RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 707.630035][T22162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8834ec96d4 [ 707.637979][T22162] R13: 00000000004c4647 R14: 00000000004d7b40 R15: 0000000000000005 [ 707.748650][T22185] IPVS: ftp: loaded support on port[0] = 21 [ 707.769188][T22191] IPVS: ftp: loaded support on port[0] = 21 14:17:33 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x600000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c12") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:34 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c12") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:34 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'lapb0\x00', 0x100000000}) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:34 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x900000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 708.479722][T22237] IPVS: ftp: loaded support on port[0] = 21 [ 708.757470][T22237] IPVS: ftp: loaded support on port[0] = 21 14:17:36 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8000, 0x22000) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:17:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)) tkill(r1, 0x1000000000015) 14:17:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:36 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x3ffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:36 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 710.000758][T22263] IPVS: ftp: loaded support on port[0] = 21 14:17:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:36 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) 14:17:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 710.349368][T22279] IPVS: ftp: loaded support on port[0] = 21 14:17:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 710.429545][T22287] IPVS: ftp: loaded support on port[0] = 21 14:17:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a0") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)) tkill(r1, 0x1000000000015) 14:17:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a0") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:36 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000001840)=""/4096, &(0x7f0000002840)=0x1000) recvmsg$kcm(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)=""/7, 0x7}, {&(0x7f0000000100)=""/14, 0xe}, {&(0x7f0000000140)=""/146, 0x92}, {&(0x7f0000000200)=""/201, 0xc9}, {&(0x7f0000000300)=""/158, 0x9e}, {&(0x7f00000003c0)=""/158, 0x9e}, {&(0x7f0000000480)=""/106, 0x6a}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x9, &(0x7f0000001600)=""/232, 0xe8}, 0x2000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001740)=@sack_info={0x0, 0x5, 0x8}, &(0x7f0000001780)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000017c0)=ANY=[@ANYRES32=r3, @ANYBLOB="05000000c2ad138e"], &(0x7f0000001800)=0xc) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000002880)) r4 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r4) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r2) [ 710.910679][T22279] chnl_net:caif_netlink_parms(): no params data found [ 710.956067][T22314] IPVS: ftp: loaded support on port[0] = 21 [ 711.166964][T22279] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.176914][T22279] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.194749][T22279] device bridge_slave_0 entered promiscuous mode [ 711.212395][T22279] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.228853][T22279] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.246760][T22279] device bridge_slave_1 entered promiscuous mode [ 711.334559][T22279] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 711.354235][T22279] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 711.397667][T22279] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 711.414780][T22279] team0: Port device team_slave_0 added [ 711.429072][T22279] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 711.448600][T22279] team0: Port device team_slave_1 added [ 711.457296][T22279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 711.484032][T22279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 711.584847][T22279] device hsr_slave_0 entered promiscuous mode [ 711.631722][T22279] device hsr_slave_1 entered promiscuous mode [ 711.672047][T22279] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 711.682983][T22279] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 711.715006][T22327] IPVS: ftp: loaded support on port[0] = 21 [ 711.739461][T22279] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.746600][T22279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 711.754042][T22279] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.761118][T22279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.824551][ T8181] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.843604][ T8181] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.008931][T22279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 712.037454][T22279] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 712.064793][T22279] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 712.077515][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 712.086607][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 712.115441][T22279] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 712.128916][T22279] 8021q: adding VLAN 0 to HW filter on device team0 [ 712.150508][T22279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 712.167610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 712.179471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 712.198401][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.205571][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 712.230669][T22279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 712.245577][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 712.261665][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 712.279135][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 712.286299][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 712.319852][T22279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 712.333553][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 712.349168][T22279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 712.366685][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 712.393437][T22279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 712.407004][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 712.419431][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 712.463758][T22279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 712.482596][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 712.495502][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 712.523900][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 712.596597][T22279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 712.608949][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 712.621954][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 712.642855][T22279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 712.655120][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 712.673354][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 712.694416][T22279] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 712.712493][T22279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 712.751863][T22279] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 712.781440][T22279] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 712.887886][T22335] IPVS: ftp: loaded support on port[0] = 21 14:17:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a0") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:39 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:39 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 713.275025][T22349] IPVS: ftp: loaded support on port[0] = 21 14:17:39 executing program 3: clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x919e, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x7ff, 0x10000, 0x1, {0x77359400}, 0x9, 0x1}) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@generic={0x0, 0x6, 0x75c6}) close(r1) pause() r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000040)={0x8, [0x2, 0x2, 0x4, 0x1, 0x7f, 0xcb19, 0x3, 0x6863, 0x2, 0x0, 0x1f, 0x80000001, 0x76ab, 0xaded, 0x8, 0x4, 0x3800000000000, 0x80000000, 0x2, 0x3c0, 0xc85, 0x3, 0x1, 0x1b5, 0xffffffffffffffc1, 0x2, 0xeda, 0x3ff, 0x8, 0x100000000, 0x7, 0x10000, 0x0, 0x4, 0x10, 0x1f7c0000000000, 0x9, 0x7, 0x4, 0x80000000, 0x5, 0x9, 0x1, 0x8, 0x7, 0x4, 0x81, 0x1ff], 0x9}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 14:17:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x376f090000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:39 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 713.883601][T22364] IPVS: ftp: loaded support on port[0] = 21 14:17:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:41 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x10ba) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x80000001, 0x2]) 14:17:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:41 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x80800) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xffff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x100, 0x6, 0x2, 0x0, r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0xffffff85, 0x0, 0xffffffffffffff07}, 0x1}], 0x1, 0x0, 0x0) close(r2) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:17:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:41 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:17:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 715.426416][T22399] IPVS: ftp: loaded support on port[0] = 21 [ 715.472818][T22405] IPVS: ftp: loaded support on port[0] = 21 14:17:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 715.520038][T22412] IPVS: ftp: loaded support on port[0] = 21 14:17:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:42 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:17:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 716.023720][T22421] IPVS: ftp: loaded support on port[0] = 21 [ 716.055297][T22444] IPVS: ftp: loaded support on port[0] = 21 [ 716.855694][ T7] device bridge_slave_1 left promiscuous mode [ 716.871429][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.917822][ T7] device bridge_slave_0 left promiscuous mode [ 716.931469][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.180530][ T7] device hsr_slave_1 left promiscuous mode [ 717.241029][ T7] device hsr_slave_0 left promiscuous mode [ 717.306823][ T7] team0 (unregistering): Port device team_slave_1 removed [ 717.336099][ T7] team0 (unregistering): Port device team_slave_0 removed [ 717.365921][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 717.441346][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 717.667819][ T7] bond0 (unregistering): Released all slaves 14:17:44 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r0, r0}) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:44 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0xe000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x2}}, 0x18) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) connect$l2tp(r2, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x2, 0x4, {0xa, 0x4e21, 0x1, @mcast1, 0x3}}}, 0x3a) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:17:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:44 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:17:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 718.449999][T22460] IPVS: ftp: loaded support on port[0] = 21 [ 718.539974][T22472] IPVS: ftp: loaded support on port[0] = 21 14:17:44 executing program 5: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'lapb0\x00', 0x100000000}) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:44 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x7e6ca8487917c0fd, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000100)={0x3, @raw_data="3c45803689099471c80e982496dcf01f4ff81e73b3d76ce52ca6a0ddb0cd6a52168c661dba4ae9e51e40195bb770005e881367512ecb04520f536c3e9a7f90f8340774602f4eac37d3c16a3f1558ac7b616f112c80dcdae43136fbf22a7aa0695964135758f45b13695362a5db92ce4a9ef946b39203fbbca058516d58e43ffba8aae4f61f1922bd8cf6ab747bd3315bb211bcc7723b72816303111321a9243874296e647dec2d787107a0595b3fd9e974135b9ef3c83099be093903472cefa0555ab49ec1823f70"}) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:17:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 718.719632][T22490] IPVS: ftp: loaded support on port[0] = 21 14:17:45 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:17:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 719.037213][T22499] IPVS: ftp: loaded support on port[0] = 21 [ 719.236059][T22460] IPVS: ftp: loaded support on port[0] = 21 14:17:45 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000001}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r3, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa3f1}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:45 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 719.433437][T22511] FAULT_INJECTION: forcing a failure. [ 719.433437][T22511] name failslab, interval 1, probability 0, space 0, times 0 [ 719.491413][T22511] CPU: 1 PID: 22511 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 719.500484][T22511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.510549][T22511] Call Trace: [ 719.513866][T22511] dump_stack+0x1db/0x2d0 [ 719.518216][T22511] ? dump_stack_print_info.cold+0x20/0x20 [ 719.523962][T22511] should_fail.cold+0xa/0x14 [ 719.528568][T22511] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.534396][T22511] ? ___might_sleep+0x1e7/0x310 [ 719.539258][T22511] ? arch_local_save_flags+0x50/0x50 [ 719.544819][T22511] __should_failslab+0x121/0x190 [ 719.549769][T22511] should_failslab+0x9/0x14 [ 719.554280][T22511] __kmalloc+0x2dc/0x740 [ 719.558525][T22511] ? strncpy_from_user+0x4e0/0x4e0 [ 719.563660][T22511] ? fput+0x128/0x1a0 [ 719.567665][T22511] ? do_syscall_64+0x8c/0x800 [ 719.572347][T22511] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 719.577934][T22511] __x64_sys_memfd_create+0x13c/0x4b0 [ 719.583313][T22511] ? memfd_fcntl+0x1870/0x1870 [ 719.588084][T22511] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 719.593557][T22511] do_syscall_64+0x1a3/0x800 [ 719.598161][T22511] ? syscall_return_slowpath+0x5f0/0x5f0 [ 719.603805][T22511] ? prepare_exit_to_usermode+0x232/0x3b0 [ 719.605888][T22516] IPVS: ftp: loaded support on port[0] = 21 [ 719.609566][T22511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.609596][T22511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.609608][T22511] RIP: 0033:0x458099 [ 719.609634][T22511] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.650418][T22511] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 719.658836][T22511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 719.666813][T22511] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 719.674824][T22511] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 719.674834][T22511] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e78f96d4 [ 719.674844][T22511] R13: 00000000004c6929 R14: 00000000004dbc50 R15: 0000000000000004 [ 719.953214][T22518] IPVS: ftp: loaded support on port[0] = 21 14:17:47 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:47 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:17:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:47 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:47 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:47 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) r0 = syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 721.505907][T22532] FAULT_INJECTION: forcing a failure. [ 721.505907][T22532] name failslab, interval 1, probability 0, space 0, times 0 [ 721.553740][T22533] IPVS: ftp: loaded support on port[0] = 21 [ 721.567692][T22535] IPVS: ftp: loaded support on port[0] = 21 [ 721.579692][T22532] CPU: 0 PID: 22532 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 721.588739][T22532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.598829][T22532] Call Trace: [ 721.602142][T22532] dump_stack+0x1db/0x2d0 [ 721.606493][T22532] ? dump_stack_print_info.cold+0x20/0x20 [ 721.612230][T22532] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 721.618227][T22532] ? print_usage_bug+0xd0/0xd0 [ 721.623011][T22532] should_fail.cold+0xa/0x14 [ 721.627616][T22532] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 721.633450][T22532] ? ___might_sleep+0x1e7/0x310 [ 721.638325][T22532] ? arch_local_save_flags+0x50/0x50 [ 721.643637][T22532] __should_failslab+0x121/0x190 [ 721.648590][T22532] should_failslab+0x9/0x14 [ 721.653112][T22532] kmem_cache_alloc+0x2be/0x710 [ 721.657977][T22532] ? shmem_destroy_callback+0xc0/0xc0 [ 721.663386][T22532] shmem_alloc_inode+0x1c/0x50 [ 721.668230][T22532] alloc_inode+0x66/0x190 [ 721.672622][T22532] new_inode_pseudo+0x71/0x1b0 [ 721.677409][T22532] ? prune_icache_sb+0x1c0/0x1c0 [ 721.682380][T22532] ? _raw_spin_unlock+0x2d/0x50 [ 721.687267][T22532] new_inode+0x1f/0x40 [ 721.691348][T22532] shmem_get_inode+0xe1/0x8d0 [ 721.696043][T22532] ? shmem_encode_fh+0x340/0x340 [ 721.700990][T22532] ? lock_downgrade+0xc40/0xc40 [ 721.705848][T22532] ? lock_release+0xc40/0xc40 [ 721.707067][T22539] IPVS: ftp: loaded support on port[0] = 21 [ 721.710537][T22532] ? __check_object_size+0xa3/0x790 [ 721.710576][T22532] __shmem_file_setup.part.0+0x7e/0x2b0 [ 721.710597][T22532] shmem_file_setup+0x66/0x90 [ 721.731879][T22532] __x64_sys_memfd_create+0x2a2/0x4b0 [ 721.731897][T22532] ? memfd_fcntl+0x1870/0x1870 [ 721.731916][T22532] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 721.731940][T22532] do_syscall_64+0x1a3/0x800 14:17:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 721.731958][T22532] ? syscall_return_slowpath+0x5f0/0x5f0 [ 721.731975][T22532] ? prepare_exit_to_usermode+0x232/0x3b0 [ 721.731997][T22532] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.732023][T22532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.732036][T22532] RIP: 0033:0x458099 [ 721.732057][T22532] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 721.747639][T22532] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 721.747655][T22532] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 721.747665][T22532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 721.747681][T22532] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 721.757862][T22532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e78f96d4 [ 721.757871][T22532] R13: 00000000004c6929 R14: 00000000004dbc50 R15: 0000000000000004 14:17:48 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 722.018992][T22553] FAULT_INJECTION: forcing a failure. [ 722.018992][T22553] name failslab, interval 1, probability 0, space 0, times 0 [ 722.046056][T22553] CPU: 1 PID: 22553 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 722.055133][T22553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.055142][T22553] Call Trace: [ 722.055170][T22553] dump_stack+0x1db/0x2d0 [ 722.055193][T22553] ? dump_stack_print_info.cold+0x20/0x20 [ 722.055211][T22553] ? new_inode_pseudo+0x71/0x1b0 [ 722.055224][T22553] ? new_inode+0x1f/0x40 [ 722.055244][T22553] ? shmem_get_inode+0xe1/0x8d0 [ 722.055260][T22553] ? __shmem_file_setup.part.0+0x7e/0x2b0 [ 722.055276][T22553] ? shmem_file_setup+0x66/0x90 [ 722.055295][T22553] ? do_syscall_64+0x1a3/0x800 [ 722.055323][T22553] should_fail.cold+0xa/0x14 [ 722.068682][T22553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 722.078726][T22553] ? ___might_sleep+0x1e7/0x310 [ 722.078745][T22553] ? arch_local_save_flags+0x50/0x50 [ 722.078761][T22553] ? lockdep_init_map+0x10c/0x5b0 [ 722.078787][T22553] __should_failslab+0x121/0x190 [ 722.078810][T22553] should_failslab+0x9/0x14 [ 722.087951][T22553] kmem_cache_alloc+0x2be/0x710 [ 722.087969][T22553] ? kasan_check_read+0x11/0x20 [ 722.088010][T22553] __d_alloc+0xae/0xbe0 [ 722.088047][T22553] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 722.088065][T22553] ? _raw_spin_unlock+0x2d/0x50 14:17:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 722.088099][T22553] ? inode_sb_list_add+0x223/0x310 [ 722.098651][T22553] ? current_time+0x104/0x1b0 [ 722.098668][T22553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.098686][T22553] ? lockdep_init_map+0x10c/0x5b0 [ 722.098709][T22553] d_alloc_pseudo+0x1e/0x30 [ 722.098729][T22553] alloc_file_pseudo+0x14f/0x3b0 [ 722.098764][T22553] ? alloc_file+0x4d0/0x4d0 [ 722.108409][T22553] ? __check_object_size+0xa3/0x790 [ 722.108454][T22553] __shmem_file_setup.part.0+0x108/0x2b0 [ 722.108475][T22553] shmem_file_setup+0x66/0x90 [ 722.108492][T22553] __x64_sys_memfd_create+0x2a2/0x4b0 [ 722.108509][T22553] ? memfd_fcntl+0x1870/0x1870 [ 722.118874][T22553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 722.118900][T22553] do_syscall_64+0x1a3/0x800 [ 722.118920][T22553] ? syscall_return_slowpath+0x5f0/0x5f0 [ 722.118939][T22553] ? prepare_exit_to_usermode+0x232/0x3b0 [ 722.118966][T22553] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.129123][T22553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.129158][T22553] RIP: 0033:0x458099 14:17:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 722.129174][T22553] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 722.129183][T22553] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 722.129197][T22553] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 722.129206][T22553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 722.129222][T22553] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 722.139144][T22553] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e78f96d4 [ 722.139153][T22553] R13: 00000000004c6929 R14: 00000000004dbc50 R15: 0000000000000004 14:17:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x908a0a0000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 722.380340][T22558] IPVS: ftp: loaded support on port[0] = 21 [ 722.810081][T22539] chnl_net:caif_netlink_parms(): no params data found [ 722.978418][T22539] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.995344][T22539] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.009742][T22539] device bridge_slave_0 entered promiscuous mode [ 723.036840][T22539] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.051342][T22539] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.061714][T22539] device bridge_slave_1 entered promiscuous mode [ 723.165070][T22539] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 723.179353][T22539] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 723.227186][T22539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 723.246398][T22539] team0: Port device team_slave_0 added [ 723.262882][T22539] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 723.279186][T22539] team0: Port device team_slave_1 added [ 723.475282][T22539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 723.502063][T22539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 723.592702][T22539] device hsr_slave_0 entered promiscuous mode [ 723.661646][T22539] device hsr_slave_1 entered promiscuous mode [ 723.732056][T22539] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 723.776271][T22539] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 724.036463][T22539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 724.224566][T22539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 724.241088][ T7] device bridge_slave_1 left promiscuous mode [ 724.255646][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.308108][ T7] device bridge_slave_0 left promiscuous mode [ 724.319241][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 14:17:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 724.608162][ T7] device hsr_slave_1 left promiscuous mode [ 724.677126][ T7] device hsr_slave_0 left promiscuous mode [ 724.738391][ T7] team0 (unregistering): Port device team_slave_1 removed [ 724.792155][ T7] team0 (unregistering): Port device team_slave_0 removed [ 724.825394][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 724.932967][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 725.139689][ T7] bond0 (unregistering): Released all slaves [ 725.292637][T22539] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 725.309507][T22539] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 725.318842][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 725.327811][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 725.341010][T22539] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 725.349239][T22539] 8021q: adding VLAN 0 to HW filter on device team0 [ 725.393682][T22539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 725.409608][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 725.429634][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 725.449299][ T3471] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.456469][ T3471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.476351][T22539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 725.542498][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 725.559571][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 725.582445][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 725.601629][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 725.608713][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 725.641572][T22539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 725.731726][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 725.745501][T22539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 725.851350][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 725.864361][T22539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 725.971704][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 725.980659][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 725.989414][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 726.004002][T22539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 14:17:52 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:52 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9cffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 726.071533][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 726.080493][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 726.142931][T22585] IPVS: ftp: loaded support on port[0] = 21 [ 726.149392][T22587] FAULT_INJECTION: forcing a failure. [ 726.149392][T22587] name failslab, interval 1, probability 0, space 0, times 0 [ 726.165232][T22587] CPU: 0 PID: 22587 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 726.174274][T22587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.184335][T22587] Call Trace: [ 726.187653][T22587] dump_stack+0x1db/0x2d0 [ 726.192014][T22587] ? dump_stack_print_info.cold+0x20/0x20 [ 726.197737][T22587] ? percpu_ref_put_many+0x129/0x270 [ 726.203040][T22587] should_fail.cold+0xa/0x14 [ 726.207645][T22587] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 726.213471][T22587] ? ___might_sleep+0x1e7/0x310 [ 726.218328][T22587] ? arch_local_save_flags+0x50/0x50 [ 726.223641][T22587] __should_failslab+0x121/0x190 [ 726.228586][T22587] should_failslab+0x9/0x14 [ 726.233093][T22587] kmem_cache_alloc+0x2be/0x710 [ 726.237959][T22587] ? d_instantiate+0x7b/0xa0 [ 726.242552][T22587] ? find_held_lock+0x35/0x120 [ 726.247313][T22587] __alloc_file+0x93/0x480 [ 726.251770][T22587] ? ____fput+0x20/0x20 [ 726.255945][T22587] ? kasan_check_read+0x11/0x20 [ 726.260795][T22587] ? do_raw_spin_unlock+0xa0/0x330 [ 726.265906][T22587] ? do_raw_spin_trylock+0x270/0x270 [ 726.271195][T22587] alloc_empty_file+0x72/0x170 [ 726.275965][T22587] alloc_file+0x5e/0x4d0 [ 726.280213][T22587] alloc_file_pseudo+0x24a/0x3b0 [ 726.285169][T22587] ? alloc_file+0x4d0/0x4d0 [ 726.289671][T22587] ? __check_object_size+0xa3/0x790 [ 726.294911][T22587] __shmem_file_setup.part.0+0x108/0x2b0 [ 726.300552][T22587] shmem_file_setup+0x66/0x90 [ 726.305228][T22587] __x64_sys_memfd_create+0x2a2/0x4b0 [ 726.310592][T22587] ? memfd_fcntl+0x1870/0x1870 [ 726.315353][T22587] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 726.320857][T22587] do_syscall_64+0x1a3/0x800 [ 726.325481][T22587] ? syscall_return_slowpath+0x5f0/0x5f0 [ 726.331128][T22587] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 726.336845][T22587] ? __switch_to_asm+0x34/0x70 [ 726.341610][T22587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.347183][T22587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.353068][T22587] RIP: 0033:0x458099 [ 726.356960][T22587] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 726.376563][T22587] RSP: 002b:00007f93e78d7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 726.384973][T22587] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 726.392937][T22587] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 726.400904][T22587] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 00000000fbad8001 [ 726.408877][T22587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e78d86d4 [ 726.416845][T22587] R13: 00000000004c6929 R14: 00000000004dbc50 R15: 0000000000000004 [ 726.443000][T22539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 726.450605][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 726.471187][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 726.545458][T22539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 726.578149][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 726.595163][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 726.625304][T22539] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 726.638676][T22539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 726.702033][T22539] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 726.753532][T22539] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 726.872751][T22594] IPVS: ftp: loaded support on port[0] = 21 14:17:53 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:17:53 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) 14:17:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9fffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:53 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:53 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 727.087444][T22601] IPVS: ftp: loaded support on port[0] = 21 [ 727.092942][T22606] FAULT_INJECTION: forcing a failure. [ 727.092942][T22606] name failslab, interval 1, probability 0, space 0, times 0 [ 727.133822][T22608] IPVS: ftp: loaded support on port[0] = 21 [ 727.144065][T22606] CPU: 1 PID: 22606 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 727.153173][T22606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.163233][T22606] Call Trace: [ 727.163264][T22606] dump_stack+0x1db/0x2d0 [ 727.163296][T22606] ? dump_stack_print_info.cold+0x20/0x20 [ 727.163319][T22606] ? percpu_ref_put_many+0x129/0x270 [ 727.174662][T22611] IPVS: ftp: loaded support on port[0] = 21 [ 727.176627][T22606] should_fail.cold+0xa/0x14 [ 727.192372][T22606] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 727.198182][T22606] ? ___might_sleep+0x1e7/0x310 [ 727.203033][T22606] ? arch_local_save_flags+0x50/0x50 [ 727.208323][T22606] __should_failslab+0x121/0x190 [ 727.213314][T22606] should_failslab+0x9/0x14 [ 727.217876][T22606] kmem_cache_alloc+0x2be/0x710 [ 727.222736][T22606] ? d_instantiate+0x7b/0xa0 [ 727.227342][T22606] ? find_held_lock+0x35/0x120 [ 727.232144][T22606] __alloc_file+0x93/0x480 [ 727.236558][T22606] ? ____fput+0x20/0x20 [ 727.240714][T22606] ? kasan_check_read+0x11/0x20 [ 727.245567][T22606] ? do_raw_spin_unlock+0xa0/0x330 [ 727.250685][T22606] ? do_raw_spin_trylock+0x270/0x270 [ 727.255976][T22606] alloc_empty_file+0x72/0x170 [ 727.260741][T22606] alloc_file+0x5e/0x4d0 [ 727.264990][T22606] alloc_file_pseudo+0x24a/0x3b0 [ 727.269928][T22606] ? alloc_file+0x4d0/0x4d0 [ 727.274428][T22606] ? __check_object_size+0xa3/0x790 [ 727.279679][T22606] __shmem_file_setup.part.0+0x108/0x2b0 [ 727.285452][T22606] shmem_file_setup+0x66/0x90 [ 727.290133][T22606] __x64_sys_memfd_create+0x2a2/0x4b0 [ 727.295506][T22606] ? memfd_fcntl+0x1870/0x1870 [ 727.300270][T22606] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 727.305753][T22606] do_syscall_64+0x1a3/0x800 [ 727.310351][T22606] ? syscall_return_slowpath+0x5f0/0x5f0 [ 727.315994][T22606] ? prepare_exit_to_usermode+0x232/0x3b0 [ 727.321719][T22606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.327271][T22606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.333158][T22606] RIP: 0033:0x458099 [ 727.337050][T22606] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 727.356657][T22606] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 727.365084][T22606] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 727.373057][T22606] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 727.381035][T22606] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 727.389013][T22606] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f93e78f96d4 [ 727.396990][T22606] R13: 00000000004c6929 R14: 00000000004dbc50 R15: 0000000000000004 14:17:53 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 727.655577][T22613] IPVS: ftp: loaded support on port[0] = 21 [ 727.741449][T22620] IPVS: ftp: loaded support on port[0] = 21 [ 727.790486][T22611] IPVS: ftp: loaded support on port[0] = 21 14:17:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe4ffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:54 executing program 5 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:54 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 728.138259][T22645] FAULT_INJECTION: forcing a failure. [ 728.138259][T22645] name failslab, interval 1, probability 0, space 0, times 0 [ 728.150661][T22642] IPVS: ftp: loaded support on port[0] = 21 [ 728.235988][T22645] CPU: 1 PID: 22645 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 728.245046][T22645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.245055][T22645] Call Trace: [ 728.245084][T22645] dump_stack+0x1db/0x2d0 [ 728.245144][T22645] ? dump_stack_print_info.cold+0x20/0x20 [ 728.245175][T22645] ? inode_init_owner+0x340/0x340 [ 728.245195][T22645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.245229][T22645] should_fail.cold+0xa/0x14 [ 728.258582][T22645] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 728.279827][T22645] ? ___might_sleep+0x1e7/0x310 [ 728.279847][T22645] ? arch_local_save_flags+0x50/0x50 [ 728.279935][T22645] ? evm_inode_post_setattr+0x47/0x70 [ 728.279958][T22645] __should_failslab+0x121/0x190 [ 728.290380][T22645] should_failslab+0x9/0x14 [ 728.290398][T22645] kmem_cache_alloc+0x2be/0x710 [ 728.290411][T22645] ? find_held_lock+0x35/0x120 [ 728.290428][T22645] ? do_sys_ftruncate+0x41e/0x550 [ 728.290463][T22645] getname_flags+0xd6/0x5b0 [ 728.305929][T22645] getname+0x1a/0x20 [ 728.305948][T22645] do_sys_open+0x3a5/0x7c0 [ 728.305968][T22645] ? filp_open+0x80/0x80 [ 728.305993][T22645] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.315420][T22645] ? trace_hardirqs_off_caller+0x300/0x300 [ 728.330030][T22645] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 728.342819][T22645] __x64_sys_open+0x7e/0xc0 [ 728.342840][T22645] do_syscall_64+0x1a3/0x800 [ 728.342859][T22645] ? syscall_return_slowpath+0x5f0/0x5f0 [ 728.342878][T22645] ? prepare_exit_to_usermode+0x232/0x3b0 [ 728.342900][T22645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.342926][T22645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.342938][T22645] RIP: 0033:0x412041 [ 728.342954][T22645] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 728.342963][T22645] RSP: 002b:00007f93e78f8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 728.353274][T22645] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 728.353284][T22645] RDX: 00007f93e78f8afa RSI: 0000000000000002 RDI: 00007f93e78f8af0 [ 728.353292][T22645] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 728.353301][T22645] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 728.353309][T22645] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:17:57 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400204) 14:17:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff0f000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:57 executing program 5 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:17:57 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:17:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:17:57 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x65, &(0x7f0000013e95), 0x4) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0xd, 0x0, &(0x7f0000001580)) close(r4) close(r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_GET_NAME(0x10, &(0x7f0000000540)=""/4096) [ 731.297577][T22663] IPVS: ftp: loaded support on port[0] = 21 [ 731.316039][T22657] FAULT_INJECTION: forcing a failure. [ 731.316039][T22657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 731.329284][T22657] CPU: 1 PID: 22657 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 731.338311][T22657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.348389][T22657] Call Trace: [ 731.351701][T22657] dump_stack+0x1db/0x2d0 [ 731.356048][T22657] ? dump_stack_print_info.cold+0x20/0x20 [ 731.361738][T22667] IPVS: ftp: loaded support on port[0] = 21 [ 731.361786][T22657] ? add_lock_to_list.isra.0+0x450/0x450 [ 731.373322][T22657] should_fail.cold+0xa/0x14 [ 731.377929][T22657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.383739][T22657] ? find_held_lock+0x35/0x120 [ 731.388520][T22657] ? shmem_setattr+0x54b/0xd90 [ 731.393319][T22657] ? find_held_lock+0x35/0x120 [ 731.398131][T22657] ? shmem_setattr+0x54b/0xd90 [ 731.398150][T22657] ? lock_acquire+0x1db/0x570 [ 731.398172][T22657] should_fail_alloc_page+0x50/0x60 [ 731.412820][T22657] __alloc_pages_nodemask+0x323/0xdc0 [ 731.418200][T22657] ? inode_init_owner+0x340/0x340 [ 731.423247][T22657] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 731.428967][T22657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.429001][T22657] ? ___might_sleep+0x1e7/0x310 [ 731.429020][T22657] ? trace_hardirqs_off+0xb8/0x310 [ 731.429047][T22657] cache_grow_begin+0x9c/0x8c0 [ 731.449969][T22657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 731.456217][T22657] ? check_preemption_disabled+0x48/0x290 [ 731.456243][T22657] kmem_cache_alloc+0x645/0x710 [ 731.456272][T22657] ? find_held_lock+0x35/0x120 [ 731.456287][T22657] ? do_sys_ftruncate+0x41e/0x550 [ 731.456305][T22657] getname_flags+0xd6/0x5b0 [ 731.481095][T22657] getname+0x1a/0x20 [ 731.481113][T22657] do_sys_open+0x3a5/0x7c0 [ 731.481139][T22657] ? filp_open+0x80/0x80 [ 731.481163][T22657] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.481181][T22657] ? trace_hardirqs_off_caller+0x300/0x300 [ 731.481198][T22657] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 731.481217][T22657] __x64_sys_open+0x7e/0xc0 [ 731.481234][T22657] do_syscall_64+0x1a3/0x800 [ 731.481265][T22657] ? syscall_return_slowpath+0x5f0/0x5f0 [ 731.493782][T22657] ? prepare_exit_to_usermode+0x232/0x3b0 [ 731.493807][T22657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 731.493835][T22657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.493853][T22657] RIP: 0033:0x412041 [ 731.515649][T22657] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 731.515659][T22657] RSP: 002b:00007f93e78f8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 731.515675][T22657] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 731.515685][T22657] RDX: 00007f93e78f8afa RSI: 0000000000000002 RDI: 00007f93e78f8af0 14:17:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 731.515694][T22657] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 731.515703][T22657] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 731.515713][T22657] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 731.597964][T22673] IPVS: ftp: loaded support on port[0] = 21 14:17:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:17:57 executing program 5 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 731.896998][T22669] IPVS: ftp: loaded support on port[0] = 21 [ 731.899297][T22691] FAULT_INJECTION: forcing a failure. [ 731.899297][T22691] name failslab, interval 1, probability 0, space 0, times 0 14:17:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 731.955877][T22691] CPU: 1 PID: 22691 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 731.964934][T22691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.974993][T22691] Call Trace: [ 731.975018][T22691] dump_stack+0x1db/0x2d0 [ 731.975053][T22691] ? dump_stack_print_info.cold+0x20/0x20 [ 731.975078][T22691] should_fail.cold+0xa/0x14 [ 731.975099][T22691] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.988483][T22691] ? ___might_sleep+0x1e7/0x310 14:17:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 731.988507][T22691] ? arch_local_save_flags+0x50/0x50 [ 732.008994][T22691] ? print_usage_bug+0xd0/0xd0 [ 732.013777][T22691] __should_failslab+0x121/0x190 [ 732.018743][T22691] should_failslab+0x9/0x14 [ 732.023247][T22691] kmem_cache_alloc+0x2be/0x710 [ 732.028100][T22691] ? __lock_acquire+0x572/0x4a10 [ 732.033049][T22691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.039295][T22691] __alloc_file+0x93/0x480 [ 732.043725][T22691] ? ____fput+0x20/0x20 [ 732.043759][T22691] ? mark_held_locks+0xf0/0xf0 [ 732.043792][T22691] alloc_empty_file+0x72/0x170 [ 732.057444][T22691] path_openat+0x112/0x5660 [ 732.061956][T22691] ? add_lock_to_list.isra.0+0x450/0x450 [ 732.067603][T22691] ? __alloc_fd+0x549/0x700 [ 732.067628][T22691] ? find_held_lock+0x35/0x120 [ 732.076885][T22691] ? path_lookupat.isra.0+0xba0/0xba0 [ 732.082280][T22691] ? do_dup2+0x580/0x580 [ 732.082319][T22691] ? kasan_check_read+0x11/0x20 [ 732.091404][T22691] ? do_raw_spin_unlock+0xa0/0x330 [ 732.096526][T22691] ? do_raw_spin_trylock+0x270/0x270 14:17:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 732.096608][T22691] ? __phys_addr_symbol+0x30/0x70 [ 732.096636][T22691] do_filp_open+0x26f/0x370 [ 732.106917][T22691] ? may_open_dev+0x100/0x100 [ 732.106935][T22691] ? exit_files+0xb0/0xb0 [ 732.106955][T22691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 732.106976][T22691] ? digsig_verify.cold+0x32/0x32 [ 732.131712][T22691] ? get_unused_fd_flags+0x122/0x1a0 [ 732.131729][T22691] ? __alloc_fd+0x700/0x700 [ 732.131749][T22691] ? getname_flags+0x277/0x5b0 [ 732.131776][T22691] do_sys_open+0x59a/0x7c0 [ 732.150684][T22691] ? filp_open+0x80/0x80 [ 732.150716][T22691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.161013][T22691] ? trace_hardirqs_off_caller+0x300/0x300 [ 732.166821][T22691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 732.166843][T22691] __x64_sys_open+0x7e/0xc0 [ 732.166862][T22691] do_syscall_64+0x1a3/0x800 [ 732.166891][T22691] ? syscall_return_slowpath+0x5f0/0x5f0 [ 732.176871][T22691] ? prepare_exit_to_usermode+0x232/0x3b0 [ 732.176893][T22691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.176921][T22691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.176940][T22691] RIP: 0033:0x412041 [ 732.194375][T22663] IPVS: ftp: loaded support on port[0] = 21 [ 732.198386][T22691] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 732.233599][T22691] RSP: 002b:00007f93e78f8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 732.242009][T22691] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 732.249992][T22691] RDX: 00007f93e78f8afa RSI: 0000000000000002 RDI: 00007f93e78f8af0 [ 732.257988][T22691] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 732.265970][T22691] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 732.273937][T22691] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:01 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x8}, 0xb) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:01 executing program 5 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 735.139651][T22710] FAULT_INJECTION: forcing a failure. [ 735.139651][T22710] name failslab, interval 1, probability 0, space 0, times 0 [ 735.152485][T22709] IPVS: ftp: loaded support on port[0] = 21 [ 735.191550][T22710] CPU: 0 PID: 22710 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 735.200640][T22710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.210701][T22710] Call Trace: [ 735.214007][T22710] dump_stack+0x1db/0x2d0 [ 735.218358][T22710] ? dump_stack_print_info.cold+0x20/0x20 [ 735.224092][T22710] ? do_sys_open+0x59a/0x7c0 [ 735.228686][T22710] ? __x64_sys_open+0x7e/0xc0 [ 735.233378][T22710] ? do_syscall_64+0x1a3/0x800 [ 735.238147][T22710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.244225][T22710] should_fail.cold+0xa/0x14 [ 735.248825][T22710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 735.254662][T22710] ? ___might_sleep+0x1e7/0x310 [ 735.259550][T22710] ? arch_local_save_flags+0x50/0x50 [ 735.264865][T22710] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 735.271107][T22710] __should_failslab+0x121/0x190 [ 735.276049][T22710] should_failslab+0x9/0x14 [ 735.276068][T22710] kmem_cache_alloc+0x2be/0x710 [ 735.276085][T22710] ? __alloc_file+0x93/0x480 [ 735.276103][T22710] ? rcu_read_lock_sched_held+0x110/0x130 [ 735.276123][T22710] ? kmem_cache_alloc+0x341/0x710 [ 735.290046][T22710] security_file_alloc+0x39/0x170 [ 735.290071][T22710] __alloc_file+0x128/0x480 [ 735.290088][T22710] ? ____fput+0x20/0x20 [ 735.290109][T22710] ? mark_held_locks+0xf0/0xf0 [ 735.314463][T22710] alloc_empty_file+0x72/0x170 [ 735.314482][T22710] path_openat+0x112/0x5660 [ 735.314501][T22710] ? add_lock_to_list.isra.0+0x450/0x450 [ 735.334119][T22710] ? __alloc_fd+0x549/0x700 [ 735.334137][T22710] ? find_held_lock+0x35/0x120 [ 735.334153][T22710] ? path_lookupat.isra.0+0xba0/0xba0 [ 735.334184][T22710] ? do_dup2+0x580/0x580 [ 735.334205][T22710] ? kasan_check_read+0x11/0x20 [ 735.334221][T22710] ? do_raw_spin_unlock+0xa0/0x330 [ 735.334237][T22710] ? do_raw_spin_trylock+0x270/0x270 [ 735.334253][T22710] ? __phys_addr_symbol+0x30/0x70 [ 735.334292][T22710] do_filp_open+0x26f/0x370 [ 735.363056][T22710] ? may_open_dev+0x100/0x100 [ 735.363076][T22710] ? exit_files+0xb0/0xb0 [ 735.363101][T22710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 735.363120][T22710] ? digsig_verify.cold+0x32/0x32 [ 735.363139][T22710] ? get_unused_fd_flags+0x122/0x1a0 [ 735.363154][T22710] ? __alloc_fd+0x700/0x700 [ 735.363168][T22710] ? getname_flags+0x277/0x5b0 [ 735.363190][T22710] do_sys_open+0x59a/0x7c0 [ 735.363209][T22710] ? filp_open+0x80/0x80 [ 735.373506][T22710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.373526][T22710] ? trace_hardirqs_off_caller+0x300/0x300 [ 735.373543][T22710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.373562][T22710] __x64_sys_open+0x7e/0xc0 [ 735.373580][T22710] do_syscall_64+0x1a3/0x800 [ 735.373610][T22710] ? syscall_return_slowpath+0x5f0/0x5f0 [ 735.373641][T22710] ? prepare_exit_to_usermode+0x232/0x3b0 [ 735.373668][T22710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 735.373721][T22710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.373750][T22710] RIP: 0033:0x412041 [ 735.403726][T22710] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 735.403737][T22710] RSP: 002b:00007f93e78f8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 735.403752][T22710] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 735.403760][T22710] RDX: 00007f93e78f8afa RSI: 0000000000000002 RDI: 00007f93e78f8af0 [ 735.403782][T22710] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 735.417418][T22710] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 735.417431][T22710] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 735.639003][T22713] IPVS: ftp: loaded support on port[0] = 21 14:18:01 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40), 0x0, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:18:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:01 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)={0x0, 0x0}) r3 = creat(&(0x7f0000000200)='./file0//ile0\x00', 0x80) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000640)) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x600001, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x1ff}, &(0x7f00000008c0)=0xffffffffffffff33) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r5, 0x7ff, 0x3}, 0xffffffffffffffa2) getpgid(r2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r7, 0x84, 0x12, &(0x7f0000000900)=0x45, 0x424) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r7, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r6, &(0x7f0000000100)=ANY=[@ANYRES32=r7], 0x4) mount(&(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x2, 0x0) ioctl$TIOCNXCL(r6, 0x540d) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x7, 0x82) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000840)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r8, 0x2403, 0x80000000) memfd_create(&(0x7f0000000d80)='\x00\x00:\xab\xc2Q\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\xca\x8c\x86\xa5\xcc\x8b\x18\'0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xe4\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x000\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12\x8bC\xbe\xaa\xc6\x05v\b\x0f\x1b\x02\x82\x81<\xc018\x83\xbf\xb1CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb3\x9a\x00', 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x6b9, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) 14:18:01 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x9}, 0x28, 0x0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:01 executing program 5 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 735.849110][T22727] FAULT_INJECTION: forcing a failure. [ 735.849110][T22727] name failslab, interval 1, probability 0, space 0, times 0 [ 735.868865][T22723] IPVS: ftp: loaded support on port[0] = 21 [ 735.878249][T22728] IPVS: ftp: loaded support on port[0] = 21 [ 735.914256][T22727] CPU: 1 PID: 22727 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 735.920525][T22733] IPVS: ftp: loaded support on port[0] = 21 [ 735.923326][T22727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.923333][T22727] Call Trace: [ 735.923360][T22727] dump_stack+0x1db/0x2d0 [ 735.923398][T22727] ? dump_stack_print_info.cold+0x20/0x20 [ 735.923414][T22727] ? rb_insert_color+0x12e0/0x12e0 [ 735.923447][T22727] should_fail.cold+0xa/0x14 [ 735.939405][T22727] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 735.939430][T22727] ? ___might_sleep+0x1e7/0x310 [ 735.939451][T22727] ? arch_local_save_flags+0x50/0x50 [ 735.952762][T22727] __should_failslab+0x121/0x190 [ 735.952784][T22727] should_failslab+0x9/0x14 [ 735.952801][T22727] kmem_cache_alloc_trace+0x2d1/0x760 [ 735.952819][T22727] ? __mutex_lock+0x622/0x1670 [ 735.952833][T22727] ? find_held_lock+0x35/0x120 [ 735.952938][T22727] ? lo_ioctl+0x25b/0x23e0 [ 735.962537][T22727] ? __fget+0x473/0x710 [ 735.962556][T22727] ? loop_get_status64+0x150/0x150 [ 735.962574][T22727] __kthread_create_on_node+0x122/0x530 [ 735.962593][T22727] ? kthread_parkme+0xb0/0xb0 [ 735.962610][T22727] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 735.962628][T22727] ? rcu_read_unlock_special+0x380/0x380 [ 735.962658][T22727] ? loop_get_status64+0x150/0x150 [ 736.043268][T22727] kthread_create_on_node+0xbb/0xf0 [ 736.048478][T22727] ? __kthread_create_on_node+0x530/0x530 [ 736.054217][T22727] ? kthread_park+0x1b0/0x1b0 [ 736.058908][T22727] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 736.065161][T22727] lo_ioctl+0xc80/0x23e0 [ 736.069417][T22727] ? lo_rw_aio+0x1e50/0x1e50 [ 736.074007][T22727] ? __fget+0x473/0x710 [ 736.078192][T22727] ? lo_rw_aio+0x1e50/0x1e50 [ 736.082851][T22727] blkdev_ioctl+0x10e0/0x2120 [ 736.087533][T22727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.093776][T22727] ? blkpg_ioctl+0xc10/0xc10 [ 736.098379][T22727] ? lock_downgrade+0xc40/0xc40 [ 736.103232][T22727] ? kasan_check_read+0x11/0x20 [ 736.108088][T22727] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 736.114080][T22727] ? rcu_read_unlock_special+0x380/0x380 [ 736.119719][T22727] ? __fget+0x49a/0x710 [ 736.123930][T22727] block_ioctl+0xee/0x130 [ 736.128262][T22727] ? blkdev_fallocate+0x410/0x410 [ 736.133288][T22727] do_vfs_ioctl+0x107b/0x17d0 [ 736.137964][T22727] ? putname+0xef/0x130 [ 736.142141][T22727] ? ioctl_preallocate+0x2f0/0x2f0 [ 736.147265][T22727] ? __fget_light+0x2db/0x420 [ 736.151958][T22727] ? fget_raw+0x20/0x20 [ 736.156135][T22727] ? do_sys_open+0x3f9/0x7c0 [ 736.160722][T22727] ? do_syscall_64+0x8c/0x800 [ 736.165407][T22727] ? do_syscall_64+0x8c/0x800 [ 736.170098][T22727] ? lockdep_hardirqs_on+0x418/0x5d0 [ 736.175403][T22727] ? security_file_ioctl+0x93/0xc0 [ 736.180516][T22727] ksys_ioctl+0xab/0xd0 [ 736.184671][T22727] __x64_sys_ioctl+0x73/0xb0 [ 736.189261][T22727] do_syscall_64+0x1a3/0x800 [ 736.193855][T22727] ? syscall_return_slowpath+0x5f0/0x5f0 [ 736.199485][T22727] ? prepare_exit_to_usermode+0x232/0x3b0 [ 736.205208][T22727] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 736.210762][T22727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 736.216644][T22727] RIP: 0033:0x457f07 [ 736.220536][T22727] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 736.240145][T22727] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 736.248551][T22727] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 736.256517][T22727] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 14:18:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 736.264482][T22727] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 736.272448][T22727] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 736.280414][T22727] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:02 executing program 5 (fault-call:2 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 736.618225][T22732] IPVS: ftp: loaded support on port[0] = 21 [ 736.670939][T22740] IPVS: ftp: loaded support on port[0] = 21 [ 736.699172][T22759] FAULT_INJECTION: forcing a failure. [ 736.699172][T22759] name failslab, interval 1, probability 0, space 0, times 0 [ 736.720889][T22759] CPU: 0 PID: 22759 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 736.729921][T22759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.739972][T22759] Call Trace: [ 736.743274][T22759] dump_stack+0x1db/0x2d0 [ 736.747612][T22759] ? dump_stack_print_info.cold+0x20/0x20 [ 736.753345][T22759] ? ___might_sleep+0x1e7/0x310 [ 736.758218][T22759] should_fail.cold+0xa/0x14 [ 736.763034][T22759] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 736.763059][T22759] ? ___might_sleep+0x1e7/0x310 [ 736.763076][T22759] ? arch_local_save_flags+0x50/0x50 [ 736.763105][T22759] __should_failslab+0x121/0x190 [ 736.763126][T22759] should_failslab+0x9/0x14 [ 736.763141][T22759] kmem_cache_alloc+0x2be/0x710 [ 736.763232][T22759] __kernfs_new_node+0xfe/0x8a0 [ 736.763253][T22759] ? mark_held_locks+0xf0/0xf0 [ 736.788592][T22759] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 736.788609][T22759] ? wait_for_completion+0x810/0x810 [ 736.788636][T22759] ? __lock_is_held+0xb6/0x140 [ 736.788663][T22759] ? mutex_unlock+0xd/0x10 [ 736.822955][T22759] ? kernfs_activate+0x21c/0x2c0 [ 736.827902][T22759] kernfs_new_node+0x99/0x130 [ 736.827927][T22759] __kernfs_create_file+0x51/0x340 [ 736.827954][T22759] sysfs_add_file_mode_ns+0x222/0x560 [ 736.843106][T22759] internal_create_group+0x3d2/0xd80 [ 736.848422][T22759] ? remove_files.isra.0+0x190/0x190 [ 736.853707][T22759] ? down_write_nested+0x130/0x130 [ 736.858817][T22759] ? resched_curr+0x1a0/0x1a0 [ 736.858836][T22759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 736.858859][T22759] sysfs_create_group+0x20/0x30 [ 736.858879][T22759] lo_ioctl+0x1147/0x23e0 [ 736.878953][T22759] ? lo_rw_aio+0x1e50/0x1e50 [ 736.883575][T22759] ? __fget+0x473/0x710 [ 736.887748][T22759] ? lo_rw_aio+0x1e50/0x1e50 [ 736.887768][T22759] blkdev_ioctl+0x10e0/0x2120 [ 736.887786][T22759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.887807][T22759] ? blkpg_ioctl+0xc10/0xc10 [ 736.907899][T22759] ? lock_downgrade+0xc40/0xc40 [ 736.912756][T22759] ? kasan_check_read+0x11/0x20 [ 736.917614][T22759] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 736.923606][T22759] ? rcu_read_unlock_special+0x380/0x380 [ 736.923641][T22759] ? __fget+0x49a/0x710 [ 736.923665][T22759] block_ioctl+0xee/0x130 [ 736.923682][T22759] ? blkdev_fallocate+0x410/0x410 [ 736.923696][T22759] do_vfs_ioctl+0x107b/0x17d0 [ 736.923713][T22759] ? putname+0xef/0x130 [ 736.923730][T22759] ? ioctl_preallocate+0x2f0/0x2f0 [ 736.923748][T22759] ? __fget_light+0x2db/0x420 [ 736.923767][T22759] ? fget_raw+0x20/0x20 [ 736.947555][T22759] ? do_sys_open+0x3f9/0x7c0 [ 736.947575][T22759] ? do_syscall_64+0x8c/0x800 [ 736.947590][T22759] ? do_syscall_64+0x8c/0x800 [ 736.947610][T22759] ? lockdep_hardirqs_on+0x418/0x5d0 [ 736.979796][T22759] ? security_file_ioctl+0x93/0xc0 [ 736.979826][T22759] ksys_ioctl+0xab/0xd0 [ 736.979853][T22759] __x64_sys_ioctl+0x73/0xb0 [ 736.999009][T22759] do_syscall_64+0x1a3/0x800 [ 737.003617][T22759] ? syscall_return_slowpath+0x5f0/0x5f0 [ 737.009263][T22759] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 737.014977][T22759] ? __switch_to_asm+0x34/0x70 [ 737.015000][T22759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.015025][T22759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.015038][T22759] RIP: 0033:0x457f07 [ 737.015054][T22759] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.015063][T22759] RSP: 002b:00007f93e78d7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 737.015078][T22759] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 14:18:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 737.015087][T22759] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 737.015096][T22759] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 737.015106][T22759] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 737.015115][T22759] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xf}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:03 executing program 5 (fault-call:2 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 737.467925][T22772] FAULT_INJECTION: forcing a failure. [ 737.467925][T22772] name failslab, interval 1, probability 0, space 0, times 0 [ 737.501471][T22772] CPU: 0 PID: 22772 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 737.510527][T22772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.520591][T22772] Call Trace: [ 737.523901][T22772] dump_stack+0x1db/0x2d0 [ 737.528239][T22772] ? dump_stack_print_info.cold+0x20/0x20 [ 737.533974][T22772] ? ___might_sleep+0x1e7/0x310 [ 737.538840][T22772] should_fail.cold+0xa/0x14 [ 737.543440][T22772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 737.549256][T22772] ? ___might_sleep+0x1e7/0x310 [ 737.554115][T22772] ? arch_local_save_flags+0x50/0x50 [ 737.559424][T22772] __should_failslab+0x121/0x190 [ 737.564456][T22772] should_failslab+0x9/0x14 [ 737.569750][T22772] kmem_cache_alloc+0x2be/0x710 [ 737.574620][T22772] __kernfs_new_node+0xfe/0x8a0 [ 737.579481][T22772] ? mark_held_locks+0xf0/0xf0 [ 737.584260][T22772] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 737.589723][T22772] ? wait_for_completion+0x810/0x810 [ 737.595014][T22772] ? __lock_is_held+0xb6/0x140 [ 737.599794][T22772] ? mutex_unlock+0xd/0x10 [ 737.604212][T22772] ? kernfs_activate+0x21c/0x2c0 [ 737.609196][T22772] kernfs_new_node+0x99/0x130 [ 737.613882][T22772] __kernfs_create_file+0x51/0x340 [ 737.619005][T22772] sysfs_add_file_mode_ns+0x222/0x560 [ 737.624408][T22772] internal_create_group+0x3d2/0xd80 [ 737.629714][T22772] ? remove_files.isra.0+0x190/0x190 [ 737.635015][T22772] ? down_write_nested+0x130/0x130 [ 737.640180][T22772] ? resched_curr+0x1a0/0x1a0 [ 737.644893][T22772] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 737.651147][T22772] sysfs_create_group+0x20/0x30 [ 737.656004][T22772] lo_ioctl+0x1147/0x23e0 [ 737.660344][T22772] ? lo_rw_aio+0x1e50/0x1e50 [ 737.664960][T22772] ? __fget+0x473/0x710 [ 737.669120][T22772] ? lo_rw_aio+0x1e50/0x1e50 [ 737.673717][T22772] blkdev_ioctl+0x10e0/0x2120 [ 737.678405][T22772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.684655][T22772] ? blkpg_ioctl+0xc10/0xc10 [ 737.689253][T22772] ? lock_downgrade+0xc40/0xc40 [ 737.694106][T22772] ? kasan_check_read+0x11/0x20 [ 737.698957][T22772] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 737.704940][T22772] ? rcu_read_unlock_special+0x380/0x380 [ 737.710584][T22772] ? __fget+0x49a/0x710 [ 737.714749][T22772] block_ioctl+0xee/0x130 [ 737.719116][T22772] ? blkdev_fallocate+0x410/0x410 [ 737.724155][T22772] do_vfs_ioctl+0x107b/0x17d0 [ 737.728829][T22772] ? putname+0xef/0x130 [ 737.732983][T22772] ? ioctl_preallocate+0x2f0/0x2f0 [ 737.738095][T22772] ? __fget_light+0x2db/0x420 [ 737.742776][T22772] ? fget_raw+0x20/0x20 [ 737.746936][T22772] ? do_sys_open+0x3f9/0x7c0 [ 737.751581][T22772] ? do_syscall_64+0x8c/0x800 [ 737.756279][T22772] ? do_syscall_64+0x8c/0x800 [ 737.761204][T22772] ? lockdep_hardirqs_on+0x418/0x5d0 [ 737.766496][T22772] ? security_file_ioctl+0x93/0xc0 [ 737.771607][T22772] ksys_ioctl+0xab/0xd0 [ 737.775770][T22772] __x64_sys_ioctl+0x73/0xb0 [ 737.780359][T22772] do_syscall_64+0x1a3/0x800 [ 737.784962][T22772] ? syscall_return_slowpath+0x5f0/0x5f0 [ 737.790602][T22772] ? prepare_exit_to_usermode+0x232/0x3b0 [ 737.796331][T22772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.801899][T22772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.807788][T22772] RIP: 0033:0x457f07 [ 737.811680][T22772] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.831302][T22772] RSP: 002b:00007f93e78d7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 737.839749][T22772] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 737.847731][T22772] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 737.855710][T22772] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 737.863701][T22772] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 737.871671][T22772] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000003 14:18:07 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:18:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:07 executing program 5 (fault-call:2 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x1000000000015) 14:18:07 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)="657b05e3eebbd4e7f0f73f071093ef4bf1683f0d6973444d0ed1012b1adf4396072f222afe726285f464e6bb4bb516404ab5523439c921dfdbb8148e57474416b7a312e906d3904834bcac36b2f4ae7772a06a7a99dad08c66805143d6cdc1a612115ce44485b94e34ff11558484cb4b5f19a0376e4d9686f11c38d222b3b6c36019a716663fe95b387b0a") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() connect$bt_rfcomm(r0, &(0x7f00000000c0)={0x1f, {0x8000, 0xfa, 0x7fff, 0x3, 0x3ff, 0x1}, 0x7}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:07 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x1, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x3, 0x0) close(r0) pause() r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x7fff}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 741.124292][T22783] FAULT_INJECTION: forcing a failure. [ 741.124292][T22783] name failslab, interval 1, probability 0, space 0, times 0 [ 741.153826][T22791] IPVS: ftp: loaded support on port[0] = 21 [ 741.158514][T22787] IPVS: ftp: loaded support on port[0] = 21 [ 741.160999][T22783] CPU: 1 PID: 22783 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 741.174678][T22783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.184725][T22783] Call Trace: [ 741.188018][T22783] dump_stack+0x1db/0x2d0 [ 741.188039][T22783] ? dump_stack_print_info.cold+0x20/0x20 [ 741.188056][T22783] ? add_lock_to_list.isra.0+0x450/0x450 [ 741.188077][T22783] ? kernfs_activate+0x8f/0x2c0 [ 741.198109][T22783] should_fail.cold+0xa/0x14 [ 741.198139][T22783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 741.198163][T22783] ? ___might_sleep+0x1e7/0x310 [ 741.208615][T22783] ? arch_local_save_flags+0x50/0x50 [ 741.208644][T22783] __should_failslab+0x121/0x190 [ 741.208671][T22783] should_failslab+0x9/0x14 [ 741.219039][T22783] kmem_cache_alloc+0x2be/0x710 [ 741.219058][T22783] ? __mutex_unlock_slowpath+0x195/0x870 [ 741.219090][T22783] __kernfs_new_node+0xfe/0x8a0 [ 741.229216][T22783] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 741.229243][T22783] ? mutex_unlock+0xd/0x10 [ 741.229258][T22783] ? kernfs_activate+0x21c/0x2c0 [ 741.229292][T22783] ? kernfs_walk_and_get_ns+0x340/0x340 [ 741.238730][T22783] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 741.238747][T22783] ? kernfs_link_sibling+0x210/0x420 [ 741.238776][T22783] kernfs_new_node+0x99/0x130 [ 741.249254][T22783] __kernfs_create_file+0x51/0x340 [ 741.249276][T22783] sysfs_add_file_mode_ns+0x222/0x560 [ 741.249301][T22783] internal_create_group+0x3d2/0xd80 [ 741.259609][T22783] ? remove_files.isra.0+0x190/0x190 [ 741.259626][T22783] ? down_write_nested+0x130/0x130 [ 741.259646][T22783] ? resched_curr+0x1a0/0x1a0 14:18:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x14}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 741.259668][T22783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 741.269008][T22783] sysfs_create_group+0x20/0x30 [ 741.269026][T22783] lo_ioctl+0x1147/0x23e0 [ 741.269048][T22783] ? lo_rw_aio+0x1e50/0x1e50 [ 741.280809][T22783] ? __fget+0x473/0x710 [ 741.280828][T22783] ? lo_rw_aio+0x1e50/0x1e50 [ 741.280847][T22783] blkdev_ioctl+0x10e0/0x2120 [ 741.280868][T22783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.290819][T22783] ? blkpg_ioctl+0xc10/0xc10 [ 741.290839][T22783] ? lock_downgrade+0xc40/0xc40 [ 741.290855][T22783] ? kasan_check_read+0x11/0x20 [ 741.290879][T22783] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 741.301336][T22783] ? rcu_read_unlock_special+0x380/0x380 [ 741.301371][T22783] ? __fget+0x49a/0x710 [ 741.301397][T22783] block_ioctl+0xee/0x130 [ 741.301413][T22783] ? blkdev_fallocate+0x410/0x410 [ 741.301428][T22783] do_vfs_ioctl+0x107b/0x17d0 [ 741.301444][T22783] ? putname+0xef/0x130 [ 741.301460][T22783] ? ioctl_preallocate+0x2f0/0x2f0 [ 741.301477][T22783] ? __fget_light+0x2db/0x420 [ 741.301494][T22783] ? fget_raw+0x20/0x20 [ 741.301520][T22783] ? do_sys_open+0x3f9/0x7c0 [ 741.312080][T22783] ? do_syscall_64+0x8c/0x800 [ 741.312110][T22783] ? do_syscall_64+0x8c/0x800 [ 741.312148][T22783] ? lockdep_hardirqs_on+0x418/0x5d0 [ 741.312167][T22783] ? security_file_ioctl+0x93/0xc0 [ 741.312204][T22783] ksys_ioctl+0xab/0xd0 [ 741.321966][T22783] __x64_sys_ioctl+0x73/0xb0 [ 741.321986][T22783] do_syscall_64+0x1a3/0x800 [ 741.322004][T22783] ? syscall_return_slowpath+0x5f0/0x5f0 [ 741.322021][T22783] ? prepare_exit_to_usermode+0x232/0x3b0 [ 741.322041][T22783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.333159][T22783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.333172][T22783] RIP: 0033:0x457f07 [ 741.333188][T22783] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 741.333195][T22783] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:18:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 741.333209][T22783] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 741.333224][T22783] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 741.342111][T22783] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 741.342120][T22783] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 741.342135][T22783] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 741.529085][T22803] IPVS: ftp: loaded support on port[0] = 21 14:18:07 executing program 5 (fault-call:2 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x48}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 741.802137][T22818] FAULT_INJECTION: forcing a failure. [ 741.802137][T22818] name failslab, interval 1, probability 0, space 0, times 0 [ 741.816619][T22818] CPU: 0 PID: 22818 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 741.825668][T22818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.835733][T22818] Call Trace: [ 741.839031][T22818] dump_stack+0x1db/0x2d0 [ 741.839064][T22818] ? dump_stack_print_info.cold+0x20/0x20 [ 741.839097][T22818] ? add_lock_to_list.isra.0+0x450/0x450 [ 741.839131][T22818] ? kernfs_activate+0x8f/0x2c0 [ 741.839180][T22818] should_fail.cold+0xa/0x14 [ 741.859656][T22818] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 741.859683][T22818] ? ___might_sleep+0x1e7/0x310 [ 741.859702][T22818] ? arch_local_save_flags+0x50/0x50 [ 741.859730][T22818] __should_failslab+0x121/0x190 [ 741.859751][T22818] should_failslab+0x9/0x14 [ 741.859772][T22818] kmem_cache_alloc+0x2be/0x710 [ 741.885172][T22818] ? __mutex_unlock_slowpath+0x195/0x870 [ 741.885201][T22818] __kernfs_new_node+0xfe/0x8a0 [ 741.885223][T22818] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 741.885264][T22818] ? mutex_unlock+0xd/0x10 [ 741.885279][T22818] ? kernfs_activate+0x21c/0x2c0 [ 741.885297][T22818] ? kernfs_walk_and_get_ns+0x340/0x340 [ 741.885333][T22818] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 741.900440][T22818] ? kernfs_link_sibling+0x210/0x420 [ 741.900464][T22818] kernfs_new_node+0x99/0x130 [ 741.900487][T22818] __kernfs_create_file+0x51/0x340 [ 741.900509][T22818] sysfs_add_file_mode_ns+0x222/0x560 [ 741.900537][T22818] internal_create_group+0x3d2/0xd80 [ 741.900565][T22818] ? remove_files.isra.0+0x190/0x190 [ 741.900584][T22818] ? down_write_nested+0x130/0x130 [ 741.925750][T22818] ? resched_curr+0x1a0/0x1a0 [ 741.942095][T22818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 741.942162][T22818] sysfs_create_group+0x20/0x30 [ 741.942181][T22818] lo_ioctl+0x1147/0x23e0 [ 741.942204][T22818] ? lo_rw_aio+0x1e50/0x1e50 [ 741.942223][T22818] ? __fget+0x473/0x710 [ 741.942239][T22818] ? lo_rw_aio+0x1e50/0x1e50 [ 741.942263][T22818] blkdev_ioctl+0x10e0/0x2120 [ 741.942283][T22818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.977843][T22806] IPVS: ftp: loaded support on port[0] = 21 [ 741.979290][T22818] ? blkpg_ioctl+0xc10/0xc10 [ 741.979309][T22818] ? lock_downgrade+0xc40/0xc40 [ 741.979326][T22818] ? kasan_check_read+0x11/0x20 [ 741.979344][T22818] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 741.979378][T22818] ? rcu_read_unlock_special+0x380/0x380 [ 741.988438][T22795] IPVS: ftp: loaded support on port[0] = 21 14:18:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5e}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 741.988537][T22818] ? __fget+0x49a/0x710 [ 742.006492][T22818] block_ioctl+0xee/0x130 [ 742.006511][T22818] ? blkdev_fallocate+0x410/0x410 [ 742.006528][T22818] do_vfs_ioctl+0x107b/0x17d0 [ 742.006546][T22818] ? putname+0xef/0x130 [ 742.006563][T22818] ? ioctl_preallocate+0x2f0/0x2f0 [ 742.006583][T22818] ? __fget_light+0x2db/0x420 [ 742.050396][T22818] ? fget_raw+0x20/0x20 [ 742.050416][T22818] ? do_sys_open+0x3f9/0x7c0 [ 742.050435][T22818] ? do_syscall_64+0x8c/0x800 [ 742.050451][T22818] ? do_syscall_64+0x8c/0x800 [ 742.050468][T22818] ? lockdep_hardirqs_on+0x418/0x5d0 [ 742.050489][T22818] ? security_file_ioctl+0x93/0xc0 [ 742.063959][T22818] ksys_ioctl+0xab/0xd0 [ 742.063981][T22818] __x64_sys_ioctl+0x73/0xb0 [ 742.064000][T22818] do_syscall_64+0x1a3/0x800 [ 742.064021][T22818] ? syscall_return_slowpath+0x5f0/0x5f0 [ 742.064040][T22818] ? prepare_exit_to_usermode+0x232/0x3b0 [ 742.064062][T22818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 742.064089][T22818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.064102][T22818] RIP: 0033:0x457f07 [ 742.064118][T22818] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 742.064127][T22818] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 742.064140][T22818] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 742.064148][T22818] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 742.064155][T22818] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 742.064163][T22818] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 742.064171][T22818] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:12 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:18:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x1000000000015) 14:18:12 executing program 5 (fault-call:2 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x61}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 746.424760][T22842] FAULT_INJECTION: forcing a failure. [ 746.424760][T22842] name failslab, interval 1, probability 0, space 0, times 0 [ 746.457722][T22842] CPU: 0 PID: 22842 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 746.466760][T22842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.476834][T22842] Call Trace: [ 746.480163][T22842] dump_stack+0x1db/0x2d0 [ 746.484511][T22842] ? dump_stack_print_info.cold+0x20/0x20 [ 746.490225][T22842] ? add_lock_to_list.isra.0+0x450/0x450 [ 746.495976][T22842] ? kernfs_activate+0x8f/0x2c0 [ 746.500895][T22842] should_fail.cold+0xa/0x14 [ 746.505523][T22842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 746.511352][T22842] ? ___might_sleep+0x1e7/0x310 [ 746.516213][T22842] ? arch_local_save_flags+0x50/0x50 [ 746.521510][T22842] __should_failslab+0x121/0x190 [ 746.526459][T22842] should_failslab+0x9/0x14 [ 746.530996][T22842] kmem_cache_alloc+0x2be/0x710 [ 746.535852][T22842] ? __mutex_unlock_slowpath+0x195/0x870 [ 746.541498][T22842] __kernfs_new_node+0xfe/0x8a0 [ 746.546355][T22842] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 746.551841][T22842] ? mutex_unlock+0xd/0x10 [ 746.556107][T22847] IPVS: ftp: loaded support on port[0] = 21 [ 746.556262][T22842] ? kernfs_activate+0x21c/0x2c0 [ 746.567073][T22842] ? kernfs_walk_and_get_ns+0x340/0x340 [ 746.572621][T22842] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 746.578883][T22842] ? kernfs_link_sibling+0x210/0x420 [ 746.584171][T22842] kernfs_new_node+0x99/0x130 [ 746.588855][T22842] __kernfs_create_file+0x51/0x340 [ 746.593998][T22842] sysfs_add_file_mode_ns+0x222/0x560 [ 746.599388][T22842] internal_create_group+0x3d2/0xd80 [ 746.604685][T22842] ? remove_files.isra.0+0x190/0x190 [ 746.609972][T22842] ? down_write_nested+0x130/0x130 [ 746.615082][T22842] ? resched_curr+0x1a0/0x1a0 [ 746.615098][T22842] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 746.615120][T22842] sysfs_create_group+0x20/0x30 [ 746.615136][T22842] lo_ioctl+0x1147/0x23e0 [ 746.615157][T22842] ? lo_rw_aio+0x1e50/0x1e50 [ 746.615173][T22842] ? __fget+0x473/0x710 [ 746.615188][T22842] ? lo_rw_aio+0x1e50/0x1e50 [ 746.615207][T22842] blkdev_ioctl+0x10e0/0x2120 [ 746.615228][T22842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.643982][T22842] ? blkpg_ioctl+0xc10/0xc10 [ 746.643998][T22842] ? lock_downgrade+0xc40/0xc40 [ 746.644017][T22842] ? kasan_check_read+0x11/0x20 [ 746.664044][T22842] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 746.664063][T22842] ? rcu_read_unlock_special+0x380/0x380 [ 746.664089][T22842] ? __fget+0x49a/0x710 [ 746.689477][T22842] block_ioctl+0xee/0x130 [ 746.693808][T22842] ? blkdev_fallocate+0x410/0x410 [ 746.698826][T22842] do_vfs_ioctl+0x107b/0x17d0 [ 746.703505][T22842] ? putname+0xef/0x130 [ 746.703523][T22842] ? ioctl_preallocate+0x2f0/0x2f0 [ 746.703541][T22842] ? __fget_light+0x2db/0x420 [ 746.703558][T22842] ? fget_raw+0x20/0x20 [ 746.703576][T22842] ? do_sys_open+0x3f9/0x7c0 [ 746.703599][T22842] ? do_syscall_64+0x8c/0x800 [ 746.730874][T22842] ? do_syscall_64+0x8c/0x800 [ 746.735577][T22842] ? lockdep_hardirqs_on+0x418/0x5d0 [ 746.735597][T22842] ? security_file_ioctl+0x93/0xc0 [ 746.735617][T22842] ksys_ioctl+0xab/0xd0 [ 746.735644][T22842] __x64_sys_ioctl+0x73/0xb0 [ 746.754747][T22842] do_syscall_64+0x1a3/0x800 [ 746.759611][T22842] ? syscall_return_slowpath+0x5f0/0x5f0 [ 746.765488][T22842] ? prepare_exit_to_usermode+0x232/0x3b0 [ 746.771214][T22842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.776778][T22842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.776791][T22842] RIP: 0033:0x457f07 [ 746.776806][T22842] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.776821][T22842] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 746.814596][T22842] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 746.822590][T22842] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 746.822600][T22842] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 746.822608][T22842] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 746.822617][T22842] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:14 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000400)=""/181) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x8000, 0x2c, 0x8200, 0x3f, 0x4, 0xe6, 0x1000, 0x7, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e20, 0x3db, @ipv4={[], [], @broadcast}, 0x4000000}}}, 0x84) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000340)={{0x2, 0x2}, 'port1\x00', 0x0, 0x80000, 0x6, 0x7, 0x32, 0xff, 0xa, 0x0, 0x0, 0x101}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) rt_sigpending(&(0x7f0000000300), 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x9, 0x0, 0x5, 0x0, 'syz0\x00'}, 0x5, 0x2, 0x6, r4, 0x2, 0x5, 'syz0\x00', &(0x7f0000000040)=['-:\x00', '\x00'], 0x4, [], [0x40, 0xf2, 0x100000000, 0x3ff]}) [ 748.139055][T22863] IPVS: ftp: loaded support on port[0] = 21 14:18:14 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) r2 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x200, 0x8000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=0x0, &(0x7f0000000380)=0x4) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000003c0)={r3, 0x4}, 0x8) pause() prctl$PR_SVE_SET_VL(0x32, 0x2c513) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:18:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x1000000000015) 14:18:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x63}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:14 executing program 5 (fault-call:2 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:14 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:18:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x68}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 748.257200][T22871] FAULT_INJECTION: forcing a failure. [ 748.257200][T22871] name failslab, interval 1, probability 0, space 0, times 0 [ 748.278104][T22874] IPVS: ftp: loaded support on port[0] = 21 [ 748.282132][T22878] IPVS: ftp: loaded support on port[0] = 21 [ 748.318894][T22871] CPU: 1 PID: 22871 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 748.327953][T22871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.327960][T22871] Call Trace: [ 748.327986][T22871] dump_stack+0x1db/0x2d0 [ 748.328008][T22871] ? dump_stack_print_info.cold+0x20/0x20 [ 748.328025][T22871] ? add_lock_to_list.isra.0+0x450/0x450 [ 748.328044][T22871] ? kernfs_activate+0x8f/0x2c0 [ 748.328067][T22871] should_fail.cold+0xa/0x14 [ 748.328093][T22871] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 748.341433][T22871] ? ___might_sleep+0x1e7/0x310 [ 748.341452][T22871] ? arch_local_save_flags+0x50/0x50 [ 748.341479][T22871] __should_failslab+0x121/0x190 [ 748.341514][T22871] should_failslab+0x9/0x14 [ 748.341530][T22871] kmem_cache_alloc+0x2be/0x710 [ 748.341552][T22871] ? __mutex_unlock_slowpath+0x195/0x870 [ 748.351589][T22871] __kernfs_new_node+0xfe/0x8a0 [ 748.351609][T22871] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 748.351636][T22871] ? mutex_unlock+0xd/0x10 [ 748.351651][T22871] ? kernfs_activate+0x21c/0x2c0 [ 748.351670][T22871] ? kernfs_walk_and_get_ns+0x340/0x340 [ 748.351692][T22871] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 748.362165][T22871] ? kernfs_link_sibling+0x210/0x420 [ 748.362189][T22871] kernfs_new_node+0x99/0x130 [ 748.362212][T22871] __kernfs_create_file+0x51/0x340 [ 748.362232][T22871] sysfs_add_file_mode_ns+0x222/0x560 [ 748.362258][T22871] internal_create_group+0x3d2/0xd80 [ 748.362284][T22871] ? remove_files.isra.0+0x190/0x190 [ 748.372664][T22871] ? down_write_nested+0x130/0x130 [ 748.372685][T22871] ? resched_curr+0x1a0/0x1a0 [ 748.372702][T22871] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 748.372725][T22871] sysfs_create_group+0x20/0x30 [ 748.372742][T22871] lo_ioctl+0x1147/0x23e0 [ 748.372763][T22871] ? lo_rw_aio+0x1e50/0x1e50 [ 748.372785][T22871] ? __fget+0x473/0x710 [ 748.382891][T22871] ? lo_rw_aio+0x1e50/0x1e50 [ 748.382912][T22871] blkdev_ioctl+0x10e0/0x2120 [ 748.382930][T22871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.382945][T22871] ? blkpg_ioctl+0xc10/0xc10 [ 748.382962][T22871] ? lock_downgrade+0xc40/0xc40 [ 748.382977][T22871] ? kasan_check_read+0x11/0x20 [ 748.382994][T22871] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 748.383015][T22871] ? rcu_read_unlock_special+0x380/0x380 [ 748.392466][T22871] ? __fget+0x49a/0x710 [ 748.392494][T22871] block_ioctl+0xee/0x130 [ 748.392512][T22871] ? blkdev_fallocate+0x410/0x410 [ 748.392527][T22871] do_vfs_ioctl+0x107b/0x17d0 [ 748.392543][T22871] ? putname+0xef/0x130 [ 748.392560][T22871] ? ioctl_preallocate+0x2f0/0x2f0 [ 748.392579][T22871] ? __fget_light+0x2db/0x420 [ 748.403038][T22871] ? fget_raw+0x20/0x20 [ 748.403058][T22871] ? do_sys_open+0x3f9/0x7c0 [ 748.403076][T22871] ? do_syscall_64+0x8c/0x800 [ 748.403092][T22871] ? do_syscall_64+0x8c/0x800 [ 748.403108][T22871] ? lockdep_hardirqs_on+0x418/0x5d0 [ 748.403133][T22871] ? security_file_ioctl+0x93/0xc0 [ 748.403154][T22871] ksys_ioctl+0xab/0xd0 [ 748.413437][T22871] __x64_sys_ioctl+0x73/0xb0 [ 748.413457][T22871] do_syscall_64+0x1a3/0x800 [ 748.413477][T22871] ? syscall_return_slowpath+0x5f0/0x5f0 [ 748.413493][T22871] ? prepare_exit_to_usermode+0x232/0x3b0 [ 748.413513][T22871] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.413538][T22871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.413556][T22871] RIP: 0033:0x457f07 [ 748.422889][T22871] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 748.422898][T22871] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 748.422913][T22871] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 748.422922][T22871] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 748.422931][T22871] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 748.422940][T22871] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 748.422948][T22871] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:14 executing program 5 (fault-call:2 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 748.863501][T22878] IPVS: ftp: loaded support on port[0] = 21 14:18:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x71}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 748.945861][T22872] IPVS: ftp: loaded support on port[0] = 21 [ 748.967948][T22896] FAULT_INJECTION: forcing a failure. [ 748.967948][T22896] name failslab, interval 1, probability 0, space 0, times 0 [ 748.982929][T22896] CPU: 0 PID: 22896 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 748.991986][T22896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.002046][T22896] Call Trace: [ 749.002075][T22896] dump_stack+0x1db/0x2d0 [ 749.002098][T22896] ? dump_stack_print_info.cold+0x20/0x20 [ 749.002116][T22896] ? add_lock_to_list.isra.0+0x450/0x450 [ 749.002142][T22896] ? kernfs_activate+0x8f/0x2c0 [ 749.002168][T22896] should_fail.cold+0xa/0x14 [ 749.002193][T22896] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 749.009803][T22896] ? ___might_sleep+0x1e7/0x310 [ 749.009822][T22896] ? arch_local_save_flags+0x50/0x50 [ 749.009849][T22896] __should_failslab+0x121/0x190 [ 749.046467][T22896] should_failslab+0x9/0x14 [ 749.046489][T22896] kmem_cache_alloc+0x2be/0x710 [ 749.060767][T22896] ? __mutex_unlock_slowpath+0x195/0x870 [ 749.066436][T22896] __kernfs_new_node+0xfe/0x8a0 [ 749.071304][T22896] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 749.076797][T22896] ? mutex_unlock+0xd/0x10 [ 749.081219][T22896] ? kernfs_activate+0x21c/0x2c0 [ 749.086164][T22896] ? kernfs_walk_and_get_ns+0x340/0x340 [ 749.086184][T22896] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 749.086204][T22896] ? kernfs_link_sibling+0x210/0x420 [ 749.103311][T22896] kernfs_new_node+0x99/0x130 [ 749.108002][T22896] __kernfs_create_file+0x51/0x340 [ 749.113145][T22896] sysfs_add_file_mode_ns+0x222/0x560 [ 749.118535][T22896] internal_create_group+0x3d2/0xd80 [ 749.123835][T22896] ? remove_files.isra.0+0x190/0x190 [ 749.123855][T22896] ? down_write_nested+0x130/0x130 [ 749.134238][T22896] ? resched_curr+0x1a0/0x1a0 [ 749.138927][T22896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 749.145178][T22896] sysfs_create_group+0x20/0x30 [ 749.145197][T22896] lo_ioctl+0x1147/0x23e0 [ 749.145218][T22896] ? lo_rw_aio+0x1e50/0x1e50 [ 749.158961][T22896] ? __fget+0x473/0x710 [ 749.163124][T22896] ? lo_rw_aio+0x1e50/0x1e50 [ 749.167721][T22896] blkdev_ioctl+0x10e0/0x2120 [ 749.172413][T22896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.178653][T22896] ? blkpg_ioctl+0xc10/0xc10 [ 749.183240][T22896] ? lock_downgrade+0xc40/0xc40 [ 749.183256][T22896] ? kasan_check_read+0x11/0x20 [ 749.183273][T22896] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 749.183290][T22896] ? rcu_read_unlock_special+0x380/0x380 [ 749.183315][T22896] ? __fget+0x49a/0x710 [ 749.183341][T22896] block_ioctl+0xee/0x130 [ 749.183357][T22896] ? blkdev_fallocate+0x410/0x410 [ 749.183388][T22896] do_vfs_ioctl+0x107b/0x17d0 [ 749.199046][T22896] ? putname+0xef/0x130 [ 749.226954][T22896] ? ioctl_preallocate+0x2f0/0x2f0 [ 749.226978][T22896] ? __fget_light+0x2db/0x420 [ 749.236730][T22896] ? fget_raw+0x20/0x20 [ 749.240906][T22896] ? do_sys_open+0x3f9/0x7c0 [ 749.245495][T22896] ? do_syscall_64+0x8c/0x800 [ 749.250187][T22896] ? do_syscall_64+0x8c/0x800 [ 749.254879][T22896] ? lockdep_hardirqs_on+0x418/0x5d0 [ 749.260165][T22896] ? security_file_ioctl+0x93/0xc0 [ 749.265275][T22896] ksys_ioctl+0xab/0xd0 [ 749.265294][T22896] __x64_sys_ioctl+0x73/0xb0 [ 749.265311][T22896] do_syscall_64+0x1a3/0x800 [ 749.265330][T22896] ? syscall_return_slowpath+0x5f0/0x5f0 [ 749.265347][T22896] ? prepare_exit_to_usermode+0x232/0x3b0 [ 749.265381][T22896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 749.295508][T22896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.301423][T22896] RIP: 0033:0x457f07 [ 749.301439][T22896] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.301448][T22896] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 749.301463][T22896] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 14:18:15 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:18:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 749.301472][T22896] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 749.301481][T22896] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 749.301490][T22896] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 749.301500][T22896] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 749.509879][T22906] IPVS: ftp: loaded support on port[0] = 21 14:18:18 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x105202) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x8010800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$bt_hidp(0x1f, 0x3, 0x6) 14:18:18 executing program 5 (fault-call:2 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x73}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:18 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:18:18 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0x200) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) r1 = socket$inet(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect(r1, &(0x7f0000000000)=@nl=@unspec, 0x80) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r2) fchmod(r0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:18:18 executing program 4: r0 = syz_open_dev$media(0x0, 0x5, 0x0) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket(0x4, 0x805, 0x8) pipe(&(0x7f00000001c0)) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x7, 0x8, 0x8000, 0xfff, 0x3, 0x0, 0x7, 0x1, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}, 0x415c, 0x8, 0x100000000, 0x3, 0x8}, &(0x7f0000000180)=0x98) pause() openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x74}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 752.230254][T22937] FAULT_INJECTION: forcing a failure. [ 752.230254][T22937] name failslab, interval 1, probability 0, space 0, times 0 [ 752.257925][T22933] IPVS: ftp: loaded support on port[0] = 21 [ 752.266569][T22934] IPVS: ftp: loaded support on port[0] = 21 [ 752.281320][T22937] CPU: 1 PID: 22937 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 752.290407][T22937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.300467][T22937] Call Trace: [ 752.303767][T22937] dump_stack+0x1db/0x2d0 [ 752.308107][T22937] ? dump_stack_print_info.cold+0x20/0x20 [ 752.313850][T22937] should_fail.cold+0xa/0x14 [ 752.318462][T22937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 752.324276][T22937] ? ___might_sleep+0x1e7/0x310 [ 752.329135][T22937] ? arch_local_save_flags+0x50/0x50 [ 752.334486][T22937] ? vprintk_default+0x28/0x30 [ 752.339256][T22937] ? vprintk_func+0x86/0x189 [ 752.343852][T22937] __should_failslab+0x121/0x190 [ 752.343875][T22937] should_failslab+0x9/0x14 [ 752.343893][T22937] kmem_cache_alloc_trace+0x2d1/0x760 [ 752.343924][T22937] kobject_uevent_env+0x2fb/0x102b [ 752.353349][T22937] ? resched_curr+0x1a0/0x1a0 [ 752.353377][T22937] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 752.353401][T22937] kobject_uevent+0x20/0x26 [ 752.353417][T22937] lo_ioctl+0x11c6/0x23e0 [ 752.353439][T22937] ? lo_rw_aio+0x1e50/0x1e50 [ 752.353456][T22937] ? __fget+0x473/0x710 [ 752.353475][T22937] ? lo_rw_aio+0x1e50/0x1e50 [ 752.363964][T22937] blkdev_ioctl+0x10e0/0x2120 [ 752.363982][T22937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.363996][T22937] ? blkpg_ioctl+0xc10/0xc10 [ 752.364014][T22937] ? lock_downgrade+0xc40/0xc40 [ 752.364029][T22937] ? kasan_check_read+0x11/0x20 [ 752.364048][T22937] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 14:18:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 752.364068][T22937] ? rcu_read_unlock_special+0x380/0x380 [ 752.375010][T22937] ? __fget+0x49a/0x710 [ 752.375035][T22937] block_ioctl+0xee/0x130 [ 752.375051][T22937] ? blkdev_fallocate+0x410/0x410 [ 752.375067][T22937] do_vfs_ioctl+0x107b/0x17d0 [ 752.375082][T22937] ? putname+0xef/0x130 [ 752.375101][T22937] ? ioctl_preallocate+0x2f0/0x2f0 [ 752.383905][T22937] ? __fget_light+0x2db/0x420 [ 752.383924][T22937] ? fget_raw+0x20/0x20 [ 752.383944][T22937] ? do_sys_open+0x3f9/0x7c0 [ 752.383977][T22937] ? do_syscall_64+0x8c/0x800 [ 752.384011][T22937] ? do_syscall_64+0x8c/0x800 [ 752.392726][T22937] ? lockdep_hardirqs_on+0x418/0x5d0 [ 752.392746][T22937] ? security_file_ioctl+0x93/0xc0 [ 752.392766][T22937] ksys_ioctl+0xab/0xd0 [ 752.392784][T22937] __x64_sys_ioctl+0x73/0xb0 [ 752.392802][T22937] do_syscall_64+0x1a3/0x800 [ 752.392820][T22937] ? syscall_return_slowpath+0x5f0/0x5f0 [ 752.392840][T22937] ? prepare_exit_to_usermode+0x232/0x3b0 [ 752.402080][T22937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.402108][T22937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.402128][T22937] RIP: 0033:0x457f07 [ 752.402145][T22937] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.402153][T22937] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.402167][T22937] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 752.402182][T22937] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 752.412975][T22937] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 752.412985][T22937] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 752.412994][T22937] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:18 executing program 5 (fault-call:2 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 752.804422][T22960] FAULT_INJECTION: forcing a failure. [ 752.804422][T22960] name failslab, interval 1, probability 0, space 0, times 0 [ 752.817582][T22960] CPU: 0 PID: 22960 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 752.826650][T22960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.836706][T22960] Call Trace: [ 752.836737][T22960] dump_stack+0x1db/0x2d0 [ 752.836760][T22960] ? dump_stack_print_info.cold+0x20/0x20 [ 752.836774][T22960] ? lo_ioctl+0x11c6/0x23e0 [ 752.836791][T22960] ? blkdev_ioctl+0x10e0/0x2120 [ 752.836806][T22960] ? block_ioctl+0xee/0x130 [ 752.836822][T22960] ? do_vfs_ioctl+0x107b/0x17d0 [ 752.836838][T22960] ? ksys_ioctl+0xab/0xd0 [ 752.836859][T22960] ? do_syscall_64+0x1a3/0x800 [ 752.836895][T22960] should_fail.cold+0xa/0x14 [ 752.836963][T22960] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 752.850243][T22960] ? ___might_sleep+0x1e7/0x310 [ 752.850262][T22960] ? arch_local_save_flags+0x50/0x50 [ 752.850291][T22960] __should_failslab+0x121/0x190 [ 752.850315][T22960] should_failslab+0x9/0x14 [ 752.859649][T22960] __kmalloc+0x2dc/0x740 [ 752.859672][T22960] ? rcu_read_lock_sched_held+0x110/0x130 [ 752.859690][T22960] ? kobject_get_path+0xc4/0x1b0 [ 752.859715][T22960] kobject_get_path+0xc4/0x1b0 [ 752.873402][T22960] kobject_uevent_env+0x31f/0x102b [ 752.882730][T22960] ? resched_curr+0x1a0/0x1a0 [ 752.882749][T22960] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 752.882773][T22960] kobject_uevent+0x20/0x26 [ 752.882789][T22960] lo_ioctl+0x11c6/0x23e0 [ 752.882810][T22960] ? lo_rw_aio+0x1e50/0x1e50 [ 752.882828][T22960] ? __fget+0x473/0x710 [ 752.882842][T22960] ? lo_rw_aio+0x1e50/0x1e50 [ 752.882860][T22960] blkdev_ioctl+0x10e0/0x2120 [ 752.882876][T22960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.882891][T22960] ? blkpg_ioctl+0xc10/0xc10 [ 752.882908][T22960] ? lock_downgrade+0xc40/0xc40 [ 752.882924][T22960] ? kasan_check_read+0x11/0x20 [ 752.882961][T22960] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 752.898901][T22960] ? rcu_read_unlock_special+0x380/0x380 [ 752.898930][T22960] ? __fget+0x49a/0x710 [ 752.898956][T22960] block_ioctl+0xee/0x130 [ 752.898975][T22960] ? blkdev_fallocate+0x410/0x410 [ 752.908416][T22960] do_vfs_ioctl+0x107b/0x17d0 [ 752.908435][T22960] ? putname+0xef/0x130 [ 752.908454][T22960] ? ioctl_preallocate+0x2f0/0x2f0 [ 752.908473][T22960] ? __fget_light+0x2db/0x420 [ 752.908492][T22960] ? fget_raw+0x20/0x20 [ 752.923358][T22960] ? do_sys_open+0x3f9/0x7c0 [ 752.923402][T22960] ? do_syscall_64+0x8c/0x800 [ 752.923434][T22960] ? do_syscall_64+0x8c/0x800 [ 752.923450][T22960] ? lockdep_hardirqs_on+0x418/0x5d0 [ 752.923468][T22960] ? security_file_ioctl+0x93/0xc0 [ 752.923487][T22960] ksys_ioctl+0xab/0xd0 [ 752.923505][T22960] __x64_sys_ioctl+0x73/0xb0 [ 752.923538][T22960] do_syscall_64+0x1a3/0x800 [ 752.923557][T22960] ? syscall_return_slowpath+0x5f0/0x5f0 [ 752.923576][T22960] ? prepare_exit_to_usermode+0x232/0x3b0 [ 752.923598][T22960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.923639][T22960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.938134][T22960] RIP: 0033:0x457f07 [ 752.938153][T22960] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.953175][T22960] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.953205][T22960] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 752.953229][T22960] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 14:18:19 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 752.953253][T22960] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 752.953262][T22960] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 752.953271][T22960] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 753.096676][T22943] IPVS: ftp: loaded support on port[0] = 21 14:18:19 executing program 5 (fault-call:2 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa8}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 753.288510][T22971] IPVS: ftp: loaded support on port[0] = 21 14:18:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 753.466996][T22978] FAULT_INJECTION: forcing a failure. [ 753.466996][T22978] name failslab, interval 1, probability 0, space 0, times 0 [ 753.480255][T22978] CPU: 0 PID: 22978 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 753.489294][T22978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.489302][T22978] Call Trace: [ 753.489329][T22978] dump_stack+0x1db/0x2d0 [ 753.489353][T22978] ? dump_stack_print_info.cold+0x20/0x20 [ 753.489379][T22978] ? lo_ioctl+0x11c6/0x23e0 [ 753.489396][T22978] ? blkdev_ioctl+0x10e0/0x2120 [ 753.489421][T22978] ? block_ioctl+0xee/0x130 [ 753.526671][T22978] ? do_vfs_ioctl+0x107b/0x17d0 [ 753.531530][T22978] ? ksys_ioctl+0xab/0xd0 [ 753.535862][T22978] ? do_syscall_64+0x1a3/0x800 [ 753.540643][T22978] should_fail.cold+0xa/0x14 [ 753.540668][T22978] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 753.540699][T22978] ? ___might_sleep+0x1e7/0x310 [ 753.555910][T22978] ? arch_local_save_flags+0x50/0x50 [ 753.561245][T22978] __should_failslab+0x121/0x190 [ 753.566221][T22978] should_failslab+0x9/0x14 [ 753.570727][T22978] __kmalloc+0x2dc/0x740 [ 753.570748][T22978] ? rcu_read_lock_sched_held+0x110/0x130 [ 753.570767][T22978] ? kobject_get_path+0xc4/0x1b0 [ 753.570793][T22978] kobject_get_path+0xc4/0x1b0 [ 753.590425][T22978] kobject_uevent_env+0x31f/0x102b [ 753.595549][T22978] ? resched_curr+0x1a0/0x1a0 [ 753.600233][T22978] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 753.600259][T22978] kobject_uevent+0x20/0x26 [ 753.600277][T22978] lo_ioctl+0x11c6/0x23e0 [ 753.600298][T22978] ? lo_rw_aio+0x1e50/0x1e50 [ 753.619908][T22978] ? __fget+0x473/0x710 [ 753.624075][T22978] ? lo_rw_aio+0x1e50/0x1e50 [ 753.628690][T22978] blkdev_ioctl+0x10e0/0x2120 [ 753.628712][T22978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.628727][T22978] ? blkpg_ioctl+0xc10/0xc10 [ 753.628752][T22978] ? lock_downgrade+0xc40/0xc40 [ 753.649076][T22978] ? kasan_check_read+0x11/0x20 [ 753.649099][T22978] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 753.649117][T22978] ? rcu_read_unlock_special+0x380/0x380 [ 753.649144][T22978] ? __fget+0x49a/0x710 [ 753.669910][T22978] block_ioctl+0xee/0x130 [ 753.674249][T22978] ? blkdev_fallocate+0x410/0x410 [ 753.674268][T22978] do_vfs_ioctl+0x107b/0x17d0 [ 753.683985][T22978] ? putname+0xef/0x130 [ 753.688160][T22978] ? ioctl_preallocate+0x2f0/0x2f0 [ 753.693280][T22978] ? __fget_light+0x2db/0x420 [ 753.697990][T22978] ? fget_raw+0x20/0x20 [ 753.698010][T22978] ? do_sys_open+0x3f9/0x7c0 [ 753.698035][T22978] ? do_syscall_64+0x8c/0x800 [ 753.698058][T22978] ? do_syscall_64+0x8c/0x800 [ 753.716110][T22978] ? lockdep_hardirqs_on+0x418/0x5d0 [ 753.721436][T22978] ? security_file_ioctl+0x93/0xc0 [ 753.721472][T22978] ksys_ioctl+0xab/0xd0 [ 753.721492][T22978] __x64_sys_ioctl+0x73/0xb0 [ 753.721510][T22978] do_syscall_64+0x1a3/0x800 [ 753.721528][T22978] ? syscall_return_slowpath+0x5f0/0x5f0 [ 753.721544][T22978] ? prepare_exit_to_usermode+0x232/0x3b0 [ 753.721564][T22978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 753.721590][T22978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.721603][T22978] RIP: 0033:0x457f07 [ 753.721618][T22978] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.721633][T22978] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 753.740037][T22978] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 753.740048][T22978] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 14:18:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 753.740057][T22978] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 753.740066][T22978] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 753.740076][T22978] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:20 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 754.036644][T22995] IPVS: ftp: loaded support on port[0] = 21 14:18:21 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r3, 0x4, 0x3ee6, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x401}}, ["", "", ""]}, 0x24}}, 0x4) recvmmsg(r1, &(0x7f0000003e40), 0x10c, 0xfffffffffffffffc, 0x0) close(r0) pause() r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f00000000c0)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xe2, @empty, 0x101}, {0xa, 0x4e22, 0xffffffffffffc79d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, r6, 0x100}}, 0x48) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000340)=0xf4) socketpair$unix(0x1, 0x8000000, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 14:18:21 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x500}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:21 executing program 5 (fault-call:2 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:21 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 755.179736][T23014] FAULT_INJECTION: forcing a failure. [ 755.179736][T23014] name failslab, interval 1, probability 0, space 0, times 0 [ 755.214101][T23011] IPVS: ftp: loaded support on port[0] = 21 [ 755.221803][T23009] IPVS: ftp: loaded support on port[0] = 21 [ 755.231615][T23014] CPU: 0 PID: 23014 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 755.240661][T23014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.250715][T23014] Call Trace: [ 755.254022][T23014] dump_stack+0x1db/0x2d0 [ 755.258384][T23014] ? dump_stack_print_info.cold+0x20/0x20 [ 755.264104][T23014] ? save_stack+0x45/0xd0 [ 755.268431][T23014] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 755.274232][T23014] ? kasan_slab_alloc+0xf/0x20 [ 755.278999][T23014] ? kmem_cache_alloc_node+0x144/0x710 [ 755.284552][T23014] ? __alloc_skb+0xf4/0x730 [ 755.289059][T23014] ? kobject_uevent_env+0xa63/0x102b [ 755.294341][T23014] should_fail.cold+0xa/0x14 [ 755.298967][T23014] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 755.304789][T23014] ? ___might_sleep+0x1e7/0x310 [ 755.309643][T23014] ? arch_local_save_flags+0x50/0x50 [ 755.314926][T23014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.321171][T23014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.327424][T23014] __should_failslab+0x121/0x190 [ 755.332358][T23014] should_failslab+0x9/0x14 [ 755.336863][T23014] kmem_cache_alloc_node_trace+0x270/0x720 [ 755.342663][T23014] ? __alloc_skb+0xf4/0x730 [ 755.347168][T23014] __kmalloc_node_track_caller+0x3d/0x70 [ 755.352797][T23014] __kmalloc_reserve.isra.0+0x40/0xe0 [ 755.358173][T23014] __alloc_skb+0x12d/0x730 [ 755.362590][T23014] ? skb_trim+0x190/0x190 [ 755.366997][T23014] ? netlink_has_listeners+0x2e7/0x4a0 [ 755.372453][T23014] ? netlink_tap_init_net+0x3e0/0x3e0 [ 755.377827][T23014] alloc_uevent_skb+0x83/0x1e2 [ 755.382595][T23014] kobject_uevent_env+0xa63/0x102b [ 755.387753][T23014] ? resched_curr+0x1a0/0x1a0 [ 755.392438][T23014] kobject_uevent+0x20/0x26 [ 755.396933][T23014] lo_ioctl+0x11c6/0x23e0 [ 755.401262][T23014] ? lo_rw_aio+0x1e50/0x1e50 [ 755.405848][T23014] ? __fget+0x473/0x710 [ 755.410001][T23014] ? lo_rw_aio+0x1e50/0x1e50 [ 755.414592][T23014] blkdev_ioctl+0x10e0/0x2120 [ 755.419295][T23014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.425547][T23014] ? blkpg_ioctl+0xc10/0xc10 [ 755.430144][T23014] ? lock_downgrade+0xc40/0xc40 [ 755.434992][T23014] ? kasan_check_read+0x11/0x20 [ 755.439842][T23014] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 755.445827][T23014] ? rcu_read_unlock_special+0x380/0x380 [ 755.451483][T23014] ? __fget+0x49a/0x710 [ 755.455652][T23014] block_ioctl+0xee/0x130 [ 755.459980][T23014] ? blkdev_fallocate+0x410/0x410 [ 755.465019][T23014] do_vfs_ioctl+0x107b/0x17d0 [ 755.469708][T23014] ? putname+0xef/0x130 [ 755.473889][T23014] ? ioctl_preallocate+0x2f0/0x2f0 [ 755.478997][T23014] ? __fget_light+0x2db/0x420 [ 755.483687][T23014] ? fget_raw+0x20/0x20 [ 755.487846][T23014] ? do_sys_open+0x3f9/0x7c0 [ 755.492435][T23014] ? do_syscall_64+0x8c/0x800 [ 755.497109][T23014] ? do_syscall_64+0x8c/0x800 [ 755.501780][T23014] ? lockdep_hardirqs_on+0x418/0x5d0 [ 755.507061][T23014] ? security_file_ioctl+0x93/0xc0 [ 755.512174][T23014] ksys_ioctl+0xab/0xd0 [ 755.516353][T23014] __x64_sys_ioctl+0x73/0xb0 [ 755.520955][T23014] do_syscall_64+0x1a3/0x800 [ 755.525550][T23014] ? syscall_return_slowpath+0x5f0/0x5f0 [ 755.531187][T23014] ? prepare_exit_to_usermode+0x232/0x3b0 [ 755.536911][T23014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.542466][T23014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.548354][T23014] RIP: 0033:0x457f07 [ 755.552269][T23014] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.571901][T23014] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:18:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 755.580310][T23014] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 755.588298][T23014] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 755.596291][T23014] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 755.604371][T23014] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 755.612342][T23014] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x600}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 755.666110][T23020] IPVS: ftp: loaded support on port[0] = 21 [ 755.820510][T23031] IPVS: ftp: loaded support on port[0] = 21 14:18:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x700}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:22 executing program 5 (fault-call:2 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x900}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 756.165242][T23046] FAULT_INJECTION: forcing a failure. [ 756.165242][T23046] name failslab, interval 1, probability 0, space 0, times 0 [ 756.183800][T23046] CPU: 1 PID: 23046 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 756.192830][T23046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.202880][T23046] Call Trace: [ 756.206176][T23046] dump_stack+0x1db/0x2d0 [ 756.210547][T23046] ? dump_stack_print_info.cold+0x20/0x20 [ 756.216288][T23046] should_fail.cold+0xa/0x14 [ 756.220884][T23046] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 756.220910][T23046] ? ___might_sleep+0x1e7/0x310 [ 756.220930][T23046] ? arch_local_save_flags+0x50/0x50 [ 756.236859][T23046] ? save_stack+0x45/0xd0 [ 756.241184][T23046] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 756.241205][T23046] ? __kmalloc_reserve.isra.0+0x40/0xe0 [ 756.241219][T23046] ? __alloc_skb+0x12d/0x730 [ 756.241239][T23046] __should_failslab+0x121/0x190 [ 756.241258][T23046] should_failslab+0x9/0x14 [ 756.241277][T23046] kmem_cache_alloc+0x2be/0x710 [ 756.252634][T23046] skb_clone+0x1c5/0x510 [ 756.252653][T23046] ? refcount_dec_and_mutex_lock+0x10/0x90 [ 756.252676][T23046] ? skb_split+0x1210/0x1210 [ 756.262164][T23046] ? netlink_sock_destruct_work+0x20/0x20 [ 756.262191][T23046] netlink_broadcast_filtered+0x107b/0x16f0 [ 756.262224][T23046] ? __netlink_sendskb+0xd0/0xd0 [ 756.262239][T23046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.262263][T23046] ? refcount_inc_not_zero_checked+0x1da/0x2c0 [ 756.275830][T23046] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 756.275847][T23046] ? netlink_has_listeners+0x2e7/0x4a0 [ 756.275876][T23046] netlink_broadcast+0x3a/0x50 [ 756.297812][T23046] kobject_uevent_env+0xa94/0x102b [ 756.297833][T23046] ? resched_curr+0x1a0/0x1a0 [ 756.297865][T23046] kobject_uevent+0x20/0x26 [ 756.315150][T23046] lo_ioctl+0x11c6/0x23e0 [ 756.331143][T23046] ? lo_rw_aio+0x1e50/0x1e50 [ 756.331160][T23046] ? __fget+0x473/0x710 [ 756.331174][T23046] ? lo_rw_aio+0x1e50/0x1e50 [ 756.331197][T23046] blkdev_ioctl+0x10e0/0x2120 [ 756.367658][T23046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.373895][T23046] ? blkpg_ioctl+0xc10/0xc10 [ 756.378490][T23046] ? lock_downgrade+0xc40/0xc40 [ 756.383335][T23046] ? kasan_check_read+0x11/0x20 [ 756.388195][T23046] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 756.394174][T23046] ? rcu_read_unlock_special+0x380/0x380 [ 756.399829][T23046] ? __fget+0x49a/0x710 [ 756.403995][T23046] block_ioctl+0xee/0x130 [ 756.408338][T23046] ? blkdev_fallocate+0x410/0x410 [ 756.413376][T23046] do_vfs_ioctl+0x107b/0x17d0 [ 756.418052][T23046] ? putname+0xef/0x130 [ 756.422206][T23046] ? ioctl_preallocate+0x2f0/0x2f0 [ 756.427320][T23046] ? __fget_light+0x2db/0x420 [ 756.432015][T23046] ? fget_raw+0x20/0x20 [ 756.436188][T23046] ? do_sys_open+0x3f9/0x7c0 [ 756.440792][T23046] ? do_syscall_64+0x8c/0x800 [ 756.445467][T23046] ? do_syscall_64+0x8c/0x800 [ 756.450164][T23046] ? lockdep_hardirqs_on+0x418/0x5d0 [ 756.455483][T23046] ? security_file_ioctl+0x93/0xc0 [ 756.460600][T23046] ksys_ioctl+0xab/0xd0 [ 756.464779][T23046] __x64_sys_ioctl+0x73/0xb0 [ 756.469378][T23046] do_syscall_64+0x1a3/0x800 [ 756.473976][T23046] ? syscall_return_slowpath+0x5f0/0x5f0 [ 756.479606][T23046] ? prepare_exit_to_usermode+0x232/0x3b0 [ 756.485336][T23046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.490937][T23046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.496818][T23046] RIP: 0033:0x457f07 [ 756.500714][T23046] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 756.520321][T23046] RSP: 002b:00007f93e78d7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 756.528728][T23046] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 756.536781][T23046] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 756.544750][T23046] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 756.552717][T23046] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:18:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 756.560682][T23046] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000003 [ 756.833192][T23031] IPVS: ftp: loaded support on port[0] = 21 [ 761.140292][T20376] device bridge_slave_1 left promiscuous mode [ 761.158507][T20376] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.232371][T20376] device bridge_slave_0 left promiscuous mode [ 761.238594][T20376] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.486746][T20376] device hsr_slave_1 left promiscuous mode [ 761.537916][T20376] device hsr_slave_0 left promiscuous mode [ 761.596874][T20376] team0 (unregistering): Port device team_slave_1 removed [ 761.620887][T20376] team0 (unregistering): Port device team_slave_0 removed [ 761.648464][T20376] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 761.723501][T20376] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 761.909396][T20376] bond0 (unregistering): Released all slaves 14:18:28 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x6ca9) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$xdp(r2, &(0x7f00000004c0)={&(0x7f0000000080)={0x2c, 0x2, r3, 0x1f}, 0x10, &(0x7f0000002540)=[{&(0x7f0000000100)="adac49f9aedbbed3b3188e7acedc943178737559b4d5daf7a339553c2944a37543aa0736eab67e432dab3952745c061ebf7708a707337d515868511339dcf58a55d0b08bc3906a708dc4f57d76a2412267e7a96b22e6246532cefed318fbff97f58e24", 0x63}, {&(0x7f0000000180)="a0920e10a4e9ff9aa8d95d53437573100d2d4a20ede44f877d75f6d1e5671d6d86de222f7406d3d5921f842361226c2a8619d450290fac359bfc9b15888aae17ec90c078f89d3992fedfef10f588be31e99b03e8252f2d836c5b1deb2022e1a919108cdcbec52b", 0x67}, {&(0x7f0000000200)="fda32d76119513d7f46ba3261c241903c8e46d7525716619c3c59caedf215b4579cf82914fff24454a1b6c19bbeaaa1269dde75b9eb435007dda5ee1277ca4fe6814ac59df05f30509126e4523f38d95cd41069d284f669b254e3a88b30673d76018242fb0c892009b9e42fb66c46f57ad9c8cc9110a02bdf077479e017661e645a0b07d97d1ad3bdf8205fc002ba11b8d66b4c7f2d00c032ad5cae0adf681bcdcce5449af2342f523a8ec5fa0ed051e87ec8674b77758ea9eadb6c57917c675ced7b5a5ac55d9cb365c04701b05a01cbe96", 0xd2}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000300)="c0af96aa437e160a8ced6b0e18e769e9163d1988440744d165df381f02356caaf3d489cc8f4a089aee9baf25c9525b7376903e1de48aa07e6e9aaafe054722d1259a35279e1add15cbb9146bf77cf9d80a372c2d37e2b98d1794b06f8275a3e31dbbbd2fdf2e26b91554f7bd9307f343a86c869237fd88d3a2be14fa99ab15fa536bfd2f52cadab491949362110b986c16248ffa169e659e3daae10f43756c939f42b39a40400a6560e7a11aa5d64590ceac50b81a9b16d1f9e0db232c04bd52bf8156dbe716dc85b01d23d09373e3e1b0d4de821edfacc876", 0xd9}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000000400)="61e717a1aaf72eb5618c99015030b22fd56e44218927b1d513465a9027b8a42ea52aab48e16b953dcdb0439a5010465e4f8c7c675e08e8c03839c789d784d71485821c84b60755ce4f3691cdb8543d1c9d086ed0007e61e7bbabdf819aabd6659bf7c9b061f340023418081d2d932ff0484116e5e3322a9eaf017bb38affdf810f08b597f51fa6fd1eece50a6fdce0da36a6b77e2607fcc25c", 0x99}], 0x7, 0x0, 0x0, 0x40}, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 762.269747][T23055] IPVS: ftp: loaded support on port[0] = 21 14:18:29 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:29 executing program 5 (fault-call:2 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xf00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:29 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 763.039849][T23055] IPVS: ftp: loaded support on port[0] = 21 [ 763.076174][T23067] FAULT_INJECTION: forcing a failure. [ 763.076174][T23067] name failslab, interval 1, probability 0, space 0, times 0 [ 763.083604][T23064] IPVS: ftp: loaded support on port[0] = 21 [ 763.140700][T23067] CPU: 1 PID: 23067 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 763.145950][T23071] IPVS: ftp: loaded support on port[0] = 21 [ 763.149764][T23067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.149771][T23067] Call Trace: [ 763.149797][T23067] dump_stack+0x1db/0x2d0 [ 763.149837][T23067] ? dump_stack_print_info.cold+0x20/0x20 [ 763.149863][T23067] ? lock_downgrade+0xc40/0xc40 [ 763.183982][T23067] ? kasan_check_read+0x11/0x20 [ 763.188839][T23067] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 763.194836][T23067] should_fail.cold+0xa/0x14 [ 763.199437][T23067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.205253][T23067] ? ___might_sleep+0x1e7/0x310 [ 763.210109][T23067] ? arch_local_save_flags+0x50/0x50 [ 763.215423][T23067] __should_failslab+0x121/0x190 [ 763.220377][T23067] should_failslab+0x9/0x14 [ 763.224883][T23067] kmem_cache_alloc+0x2be/0x710 [ 763.229740][T23067] ? __fget_light+0x2db/0x420 [ 763.234436][T23067] getname_flags+0xd6/0x5b0 [ 763.238951][T23067] do_mkdirat+0xba/0x2f0 [ 763.243201][T23067] ? __ia32_sys_mknod+0xb0/0xb0 [ 763.248082][T23067] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.254187][T23067] ? trace_hardirqs_off_caller+0x300/0x300 [ 763.260000][T23067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 763.265501][T23067] __x64_sys_mkdir+0x5c/0x80 [ 763.270102][T23067] do_syscall_64+0x1a3/0x800 [ 763.274706][T23067] ? syscall_return_slowpath+0x5f0/0x5f0 [ 763.280354][T23067] ? prepare_exit_to_usermode+0x232/0x3b0 [ 763.286091][T23067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.291676][T23067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.297586][T23067] RIP: 0033:0x4574b7 [ 763.301483][T23067] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.321095][T23067] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 763.329516][T23067] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 14:18:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1018}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1400}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:29 executing program 2: read(0xffffffffffffffff, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000015) [ 763.337486][T23067] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 763.345460][T23067] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 763.353446][T23067] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 763.361417][T23067] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:29 executing program 2: read(0xffffffffffffffff, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000015) 14:18:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1810}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:29 executing program 5 (fault-call:2 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 763.651018][T23092] FAULT_INJECTION: forcing a failure. [ 763.651018][T23092] name failslab, interval 1, probability 0, space 0, times 0 [ 763.684292][T23092] CPU: 1 PID: 23092 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 763.693340][T23092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.703403][T23092] Call Trace: [ 763.706701][T23092] dump_stack+0x1db/0x2d0 [ 763.711056][T23092] ? dump_stack_print_info.cold+0x20/0x20 [ 763.716780][T23092] ? lock_downgrade+0xc40/0xc40 [ 763.721632][T23092] ? kasan_check_read+0x11/0x20 [ 763.726487][T23092] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 763.732477][T23092] should_fail.cold+0xa/0x14 [ 763.737074][T23092] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.742893][T23092] ? ___might_sleep+0x1e7/0x310 [ 763.747750][T23092] ? arch_local_save_flags+0x50/0x50 [ 763.753047][T23092] __should_failslab+0x121/0x190 [ 763.757988][T23092] should_failslab+0x9/0x14 [ 763.762496][T23092] kmem_cache_alloc+0x2be/0x710 [ 763.767354][T23092] ? __fget_light+0x2db/0x420 [ 763.772052][T23092] getname_flags+0xd6/0x5b0 [ 763.776561][T23092] do_mkdirat+0xba/0x2f0 [ 763.780807][T23092] ? __ia32_sys_mknod+0xb0/0xb0 [ 763.785662][T23092] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.791740][T23092] ? trace_hardirqs_off_caller+0x300/0x300 [ 763.797555][T23092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 763.803019][T23092] __x64_sys_mkdir+0x5c/0x80 [ 763.807614][T23092] do_syscall_64+0x1a3/0x800 [ 763.812209][T23092] ? syscall_return_slowpath+0x5f0/0x5f0 [ 763.817862][T23092] ? prepare_exit_to_usermode+0x232/0x3b0 [ 763.823592][T23092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.829155][T23092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.835043][T23092] RIP: 0033:0x4574b7 [ 763.838941][T23092] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.858544][T23092] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 763.866978][T23092] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 763.874943][T23092] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 763.882915][T23092] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 763.890882][T23092] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 763.899324][T23092] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 763.922414][T23078] IPVS: ftp: loaded support on port[0] = 21 14:18:33 executing program 2: read(0xffffffffffffffff, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000015) 14:18:33 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}, 0x20000}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000040)=""/202) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:33 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:33 executing program 5 (fault-call:2 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:33 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa86e8380e3dd90b3, 0x0) unshare(0x40000000) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000100)=""/192) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r2) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:18:33 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 767.776211][T23102] FAULT_INJECTION: forcing a failure. [ 767.776211][T23102] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.789503][T23102] CPU: 0 PID: 23102 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 767.792071][T23110] IPVS: ftp: loaded support on port[0] = 21 [ 767.798526][T23102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.798534][T23102] Call Trace: [ 767.798562][T23102] dump_stack+0x1db/0x2d0 [ 767.798587][T23102] ? dump_stack_print_info.cold+0x20/0x20 [ 767.798615][T23102] ? resched_curr+0x1a0/0x1a0 [ 767.832553][T23102] should_fail.cold+0xa/0x14 [ 767.837175][T23102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.843000][T23102] ? lo_rw_aio+0x1e50/0x1e50 [ 767.847600][T23102] ? lo_rw_aio+0x1e50/0x1e50 [ 767.852207][T23102] should_fail_alloc_page+0x50/0x60 [ 767.857416][T23102] __alloc_pages_nodemask+0x323/0xdc0 [ 767.862794][T23102] ? lock_downgrade+0xc40/0xc40 [ 767.867659][T23102] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 767.873387][T23102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.879653][T23102] ? ___might_sleep+0x1e7/0x310 [ 767.884511][T23102] ? trace_hardirqs_off+0xb8/0x310 [ 767.889650][T23102] cache_grow_begin+0x9c/0x8c0 [ 767.894641][T23102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 767.900897][T23102] ? check_preemption_disabled+0x48/0x290 [ 767.906629][T23102] kmem_cache_alloc+0x645/0x710 [ 767.911505][T23102] getname_flags+0xd6/0x5b0 [ 767.916012][T23102] do_mkdirat+0xba/0x2f0 [ 767.920286][T23102] ? __ia32_sys_mknod+0xb0/0xb0 [ 767.925140][T23102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.931226][T23102] ? trace_hardirqs_off_caller+0x300/0x300 [ 767.937047][T23102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 767.942529][T23102] __x64_sys_mkdir+0x5c/0x80 [ 767.947126][T23102] do_syscall_64+0x1a3/0x800 [ 767.951722][T23102] ? syscall_return_slowpath+0x5f0/0x5f0 [ 767.957367][T23102] ? prepare_exit_to_usermode+0x232/0x3b0 [ 767.963103][T23102] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.968669][T23102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.974563][T23102] RIP: 0033:0x4574b7 [ 767.978455][T23102] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.998095][T23102] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 768.006511][T23102] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 768.014490][T23102] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 14:18:34 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 768.022477][T23102] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 768.030456][T23102] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 768.038434][T23102] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 768.048353][T23105] IPVS: ftp: loaded support on port[0] = 21 14:18:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:34 executing program 5 (fault-call:2 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 768.107505][T23114] IPVS: ftp: loaded support on port[0] = 21 [ 768.246817][T23124] FAULT_INJECTION: forcing a failure. [ 768.246817][T23124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 768.260062][T23124] CPU: 1 PID: 23124 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 768.260073][T23124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.260078][T23124] Call Trace: [ 768.260107][T23124] dump_stack+0x1db/0x2d0 [ 768.260137][T23124] ? dump_stack_print_info.cold+0x20/0x20 14:18:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 768.260160][T23124] ? resched_curr+0x1a0/0x1a0 [ 768.260186][T23124] should_fail.cold+0xa/0x14 [ 768.260209][T23124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.260234][T23124] ? lo_rw_aio+0x1e50/0x1e50 [ 768.286903][T23124] ? lo_rw_aio+0x1e50/0x1e50 [ 768.286930][T23124] should_fail_alloc_page+0x50/0x60 [ 768.286947][T23124] __alloc_pages_nodemask+0x323/0xdc0 [ 768.286966][T23124] ? lock_downgrade+0xc40/0xc40 [ 768.286986][T23124] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 768.297390][T23124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.297423][T23124] ? ___might_sleep+0x1e7/0x310 [ 768.297443][T23124] ? trace_hardirqs_off+0xb8/0x310 [ 768.297464][T23124] cache_grow_begin+0x9c/0x8c0 [ 768.297484][T23124] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 768.307859][T23124] ? check_preemption_disabled+0x48/0x290 [ 768.307885][T23124] kmem_cache_alloc+0x645/0x710 [ 768.307911][T23124] getname_flags+0xd6/0x5b0 [ 768.307931][T23124] do_mkdirat+0xba/0x2f0 [ 768.307950][T23124] ? __ia32_sys_mknod+0xb0/0xb0 [ 768.317142][T23124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.317162][T23124] ? trace_hardirqs_off_caller+0x300/0x300 [ 768.317181][T23124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 768.317202][T23124] __x64_sys_mkdir+0x5c/0x80 [ 768.317222][T23124] do_syscall_64+0x1a3/0x800 [ 768.327784][T23124] ? syscall_return_slowpath+0x5f0/0x5f0 [ 768.327805][T23124] ? prepare_exit_to_usermode+0x232/0x3b0 [ 768.327827][T23124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.327855][T23124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.327873][T23124] RIP: 0033:0x4574b7 [ 768.338443][T23124] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.338452][T23124] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 768.338468][T23124] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 768.338477][T23124] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 768.338487][T23124] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 768.338496][T23124] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 768.338505][T23124] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 768.560534][T23106] IPVS: ftp: loaded support on port[0] = 21 14:18:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 768.867137][T23125] IPVS: ftp: loaded support on port[0] = 21 14:18:35 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) unshare(0xc020000) write$vnet(r0, &(0x7f0000000100)={0x1, {&(0x7f0000000000)=""/139, 0x8b, &(0x7f00000000c0)=""/11, 0x1, 0x1}}, 0x68) close(r1) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x7, &(0x7f0000000640)=[{&(0x7f0000000200)="eca33858b082762548f827032375a9696b73af313f4e196cfac2a6a6e3cd12439d94a551b4a9ab1b8b785fbdf4f69933", 0x30, 0x7}, {&(0x7f0000000240)="bd3983eb113783400866b9006d19a51260d35252f36a3c3ed25f1301d4a9ceabc57b3bd4dd267638013ed7b98640288f7bf6d4ee7f8eeee80010d5e838a194355428a90153cb7a4ae537484d9410a2cb6e5fdaa28f2d9d586517a261c7595036284eeeea5e05dfc07811181c8f20e6ce23314a0d30c0aa7c7bdef82286a51f708d5ca828c6682e4e1df0bcd66f7b0c2591a389e760a60dbaf87735c48b2828bdf82ecbe9e70dcd3ae73624c3305c75c33ea4275ec1e8dd08bb2e32c416514db21c15b22f539e7c23e0c4479b95ae8fe74d41", 0xd2, 0x6}, {&(0x7f0000000340)="834bbc5fdf3013c96cf4c790520f3038b89d18402733d4a96dd7becaaceb560b70b0bd614ceb18d5e88f022508b7a5e74c530819d35857df66e01fdcc6e5cc96005043980cfd021628a003255f95f758cc4ea14c2091970f665e1229430ca1f5758e55f69ee778cebc812133570f012763bd9197e4a61e5a5696c52a89cc5eb85c70f0daf0b77a6f1801f9664a0d3dff469ed7ca93714e816311e54b1ade836b2ab87b16c0360a6a5b319f2cf015b2a79d7169bede2c97a99b2c67", 0xbb, 0xff}, {&(0x7f0000000400)="23a74b32b34ca3a5b73dae84d5b8fcd1c54ab3c5d5557cef4833508f41047c1ce93ac3f2ff3646b7d6a2423759c38f55a90a55a515a1275f2220f891c2bc10a1a59e202a523b7fc602a637bbb7d41ad48a948fafde4bcd7b0edd6e3c43a016bf342354de89478fce8b6a901cccf2917dcc", 0x71, 0x7}, {&(0x7f0000000480)="2b51c71963fe9cb3c5e1658e5c55dccabfa715b83a38a8f41a82234a0f50a3269b08fe62cb7b7fe09b3afd91d20d04f6f755503e8a1ae00aa04a0304471b3e152af1437747af05be31b66358dd41", 0x4e, 0x5}, {&(0x7f0000000540)="5dde098003184dc26af463a389e09d13487381993e36c9bc37ee0cc253e0c242e43ebc3f50b2013e4ab12d1ad916c37d85aa0b521481bf539c8033e6642f06a0a4551014ef15aa0d55dcd0420fa2c62637805521fc7302b4bfb382cf09ac61a75d939d03b75ef43c0c660762531d212f7b", 0x71}, {&(0x7f00000005c0)="3e68908d703de94e982c8badcb2fc3b33a9c26d3bc9faef07c5f43fc478dbd7ac732da4849c5a56107d07234f862f905e80878ab9325bf4e9009e2cb7edc6a249e7786cb4f328c60fe944b43ac2e", 0x4e, 0x101}], 0x8000, &(0x7f0000000700)={[{@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffc}}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}], [{@seclabel='seclabel'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:38 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:38 executing program 5 (fault-call:2 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 772.474942][T23143] FAULT_INJECTION: forcing a failure. [ 772.474942][T23143] name failslab, interval 1, probability 0, space 0, times 0 [ 772.502158][T23143] CPU: 1 PID: 23143 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 772.511186][T23143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.521245][T23143] Call Trace: [ 772.523117][T23146] IPVS: ftp: loaded support on port[0] = 21 [ 772.524546][T23143] dump_stack+0x1db/0x2d0 [ 772.524583][T23143] ? dump_stack_print_info.cold+0x20/0x20 [ 772.540507][T23143] ? kasan_check_write+0x14/0x20 [ 772.545447][T23143] ? __brelse+0x105/0x180 [ 772.545488][T23143] should_fail.cold+0xa/0x14 [ 772.545509][T23143] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 772.554417][T23143] ? ___might_sleep+0x1e7/0x310 [ 772.554435][T23143] ? arch_local_save_flags+0x50/0x50 [ 772.554456][T23143] ? __lock_acquire+0x572/0x4a10 [ 772.565102][T23143] __should_failslab+0x121/0x190 [ 772.565129][T23143] should_failslab+0x9/0x14 [ 772.565145][T23143] kmem_cache_alloc+0x2be/0x710 [ 772.565165][T23143] ? mark_held_locks+0xf0/0xf0 [ 772.565281][T23143] ext4_alloc_inode+0xa5/0x860 [ 772.575389][T23143] ? ratelimit_state_init+0xb0/0xb0 [ 772.575406][T23143] ? __find_get_block+0xf20/0xf20 [ 772.575484][T23143] ? ext4_map_blocks+0x40f/0x1b90 [ 772.584858][T23143] ? is_bpf_text_address+0xd3/0x170 [ 772.584892][T23143] ? add_lock_to_list.isra.0+0x450/0x450 [ 772.584907][T23143] ? add_lock_to_list.isra.0+0x450/0x450 [ 772.584936][T23143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.584949][T23143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.584970][T23143] ? ratelimit_state_init+0xb0/0xb0 [ 772.584989][T23143] alloc_inode+0x66/0x190 [ 772.594584][T23143] new_inode_pseudo+0x71/0x1b0 [ 772.604517][T23143] ? prune_icache_sb+0x1c0/0x1c0 [ 772.604550][T23143] new_inode+0x1f/0x40 [ 772.614580][T23143] __ext4_new_inode+0x454/0x6eb0 [ 772.614600][T23143] ? rcu_softirq_qs+0x20/0x20 [ 772.614625][T23143] ? is_bpf_text_address+0xd3/0x170 [ 772.614644][T23143] ? ext4_free_inode+0x1a30/0x1a30 [ 772.614676][T23143] ? unwind_get_return_address+0x61/0xa0 [ 772.614727][T23143] ? __save_stack_trace+0x8a/0xf0 [ 772.625535][T23143] ? save_stack+0xa9/0xd0 [ 772.625557][T23143] ? __kasan_slab_free+0x102/0x150 [ 772.637403][T23143] ? kasan_slab_free+0xe/0x10 [ 772.637418][T23143] ? kmem_cache_free+0x86/0x260 [ 772.637431][T23143] ? putname+0xef/0x130 [ 772.637449][T23143] ? filename_create+0x29d/0x5a0 [ 772.648862][T23143] ? do_mkdirat+0xcf/0x2f0 [ 772.648875][T23143] ? __x64_sys_mkdir+0x5c/0x80 [ 772.648891][T23143] ? do_syscall_64+0x1a3/0x800 [ 772.648910][T23143] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.648930][T23143] ? trace_hardirqs_off+0xb8/0x310 [ 772.658006][T23143] ? print_usage_bug+0xd0/0xd0 [ 772.658024][T23143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.658107][T23143] ? __dquot_initialize+0x632/0xda0 [ 772.658136][T23143] ? d_instantiate_anon+0x30/0x30 [ 772.667125][T23143] ? dquot_get_next_dqblk+0x180/0x180 [ 772.667147][T23143] ? check_preemption_disabled+0x48/0x290 [ 772.667168][T23143] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 772.676769][T23143] ext4_mkdir+0x45a/0xef0 [ 772.676805][T23143] ? ext4_init_dot_dotdot+0x520/0x520 [ 772.687093][T23143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.687109][T23143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.687132][T23143] ? security_inode_permission+0xd5/0x110 [ 772.687152][T23143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.697784][T23143] ? security_inode_mkdir+0xee/0x120 [ 772.697804][T23143] vfs_mkdir+0x433/0x690 [ 772.697825][T23143] do_mkdirat+0x271/0x2f0 [ 772.697844][T23143] ? __ia32_sys_mknod+0xb0/0xb0 [ 772.707261][T23143] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.707296][T23143] ? trace_hardirqs_off_caller+0x300/0x300 [ 772.707314][T23143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 772.707335][T23143] __x64_sys_mkdir+0x5c/0x80 [ 772.716845][T23143] do_syscall_64+0x1a3/0x800 [ 772.716867][T23143] ? syscall_return_slowpath+0x5f0/0x5f0 [ 772.716885][T23143] ? prepare_exit_to_usermode+0x232/0x3b0 [ 772.716906][T23143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 772.725972][T23143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.725985][T23143] RIP: 0033:0x4574b7 [ 772.726002][T23143] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 772.726010][T23143] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:18:39 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000040)=0x5) r3 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='*\x8cppp0\x00', 0xfffffffffffffffd) keyctl$set_timeout(0xf, r3, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x772eec791b196ad1, 0x7, 0x20) 14:18:39 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) fsync(r0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) set_thread_area(&(0x7f0000000000)={0x5a, 0xffffffffffffffff, 0x1400, 0x20000, 0x81, 0xfffffffffffffff9, 0x8, 0x101, 0x0, 0x3}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) getrlimit(0xf, &(0x7f0000000080)) pause() setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x6, 0x8) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000140)={0x6, 0x2, 0x100000001, 0x100000001}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:39 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5e00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 772.726026][T23143] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 772.726035][T23143] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 772.726050][T23143] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 772.735192][T23143] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 772.735202][T23143] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 773.004905][T23156] IPVS: ftp: loaded support on port[0] = 21 [ 773.018160][T23152] IPVS: ftp: loaded support on port[0] = 21 14:18:39 executing program 5 (fault-call:2 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6100}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 773.210212][T23166] FAULT_INJECTION: forcing a failure. [ 773.210212][T23166] name failslab, interval 1, probability 0, space 0, times 0 [ 773.253420][T23166] CPU: 0 PID: 23166 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 773.262454][T23166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.272515][T23166] Call Trace: [ 773.275825][T23166] dump_stack+0x1db/0x2d0 [ 773.280158][T23166] ? dump_stack_print_info.cold+0x20/0x20 [ 773.285903][T23166] ? kasan_check_write+0x14/0x20 [ 773.290839][T23166] ? __brelse+0x105/0x180 [ 773.295172][T23166] should_fail.cold+0xa/0x14 [ 773.299760][T23166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 773.305570][T23166] ? ___might_sleep+0x1e7/0x310 [ 773.310504][T23166] ? arch_local_save_flags+0x50/0x50 [ 773.315808][T23166] ? __lock_acquire+0x572/0x4a10 [ 773.320778][T23166] __should_failslab+0x121/0x190 [ 773.325725][T23166] should_failslab+0x9/0x14 [ 773.330234][T23166] kmem_cache_alloc+0x2be/0x710 [ 773.335127][T23166] ? mark_held_locks+0xf0/0xf0 [ 773.339913][T23166] ext4_alloc_inode+0xa5/0x860 [ 773.344683][T23166] ? ratelimit_state_init+0xb0/0xb0 [ 773.349880][T23166] ? __find_get_block+0xf20/0xf20 [ 773.354899][T23166] ? ext4_map_blocks+0x40f/0x1b90 [ 773.359923][T23166] ? is_bpf_text_address+0xd3/0x170 [ 773.365123][T23166] ? add_lock_to_list.isra.0+0x450/0x450 [ 773.370757][T23166] ? add_lock_to_list.isra.0+0x450/0x450 [ 773.376435][T23166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.382701][T23166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.388941][T23166] ? ratelimit_state_init+0xb0/0xb0 [ 773.394140][T23166] alloc_inode+0x66/0x190 [ 773.398510][T23166] new_inode_pseudo+0x71/0x1b0 [ 773.403277][T23166] ? prune_icache_sb+0x1c0/0x1c0 [ 773.408219][T23166] new_inode+0x1f/0x40 [ 773.412284][T23166] __ext4_new_inode+0x454/0x6eb0 [ 773.417227][T23166] ? rcu_softirq_qs+0x20/0x20 [ 773.421913][T23166] ? is_bpf_text_address+0xd3/0x170 [ 773.427126][T23166] ? ext4_free_inode+0x1a30/0x1a30 [ 773.432243][T23166] ? unwind_get_return_address+0x61/0xa0 [ 773.437876][T23166] ? __save_stack_trace+0x8a/0xf0 [ 773.442921][T23166] ? save_stack+0xa9/0xd0 [ 773.447274][T23166] ? __kasan_slab_free+0x102/0x150 [ 773.452408][T23166] ? kasan_slab_free+0xe/0x10 [ 773.457082][T23166] ? kmem_cache_free+0x86/0x260 [ 773.461927][T23166] ? putname+0xef/0x130 [ 773.466073][T23166] ? filename_create+0x29d/0x5a0 [ 773.471021][T23166] ? do_mkdirat+0xcf/0x2f0 [ 773.475456][T23166] ? __x64_sys_mkdir+0x5c/0x80 [ 773.480254][T23166] ? do_syscall_64+0x1a3/0x800 [ 773.485024][T23166] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.491099][T23166] ? trace_hardirqs_off+0xb8/0x310 [ 773.496228][T23166] ? print_usage_bug+0xd0/0xd0 [ 773.501009][T23166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.507255][T23166] ? __dquot_initialize+0x632/0xda0 [ 773.512461][T23166] ? d_instantiate_anon+0x30/0x30 [ 773.517498][T23166] ? dquot_get_next_dqblk+0x180/0x180 [ 773.522878][T23166] ? check_preemption_disabled+0x48/0x290 [ 773.528602][T23166] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 773.534254][T23166] ext4_mkdir+0x45a/0xef0 [ 773.538602][T23166] ? ext4_init_dot_dotdot+0x520/0x520 [ 773.543980][T23166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.550221][T23166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.556474][T23166] ? security_inode_permission+0xd5/0x110 [ 773.562196][T23166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.568436][T23166] ? security_inode_mkdir+0xee/0x120 [ 773.573728][T23166] vfs_mkdir+0x433/0x690 [ 773.577982][T23166] do_mkdirat+0x271/0x2f0 [ 773.582313][T23166] ? __ia32_sys_mknod+0xb0/0xb0 [ 773.587168][T23166] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.593236][T23166] ? trace_hardirqs_off_caller+0x300/0x300 [ 773.599044][T23166] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 773.604510][T23166] __x64_sys_mkdir+0x5c/0x80 [ 773.609110][T23166] do_syscall_64+0x1a3/0x800 [ 773.613703][T23166] ? syscall_return_slowpath+0x5f0/0x5f0 [ 773.619337][T23166] ? prepare_exit_to_usermode+0x232/0x3b0 [ 773.625070][T23166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 773.630638][T23166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.636532][T23166] RIP: 0033:0x4574b7 [ 773.640425][T23166] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 773.660036][T23166] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 773.668459][T23166] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 773.676436][T23166] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 773.684407][T23166] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 773.692414][T23166] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 14:18:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:39 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 773.700401][T23166] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 773.789791][T23152] IPVS: ftp: loaded support on port[0] = 21 [ 773.829778][T23172] IPVS: ftp: loaded support on port[0] = 21 14:18:40 executing program 5 (fault-call:2 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 773.862864][T23161] IPVS: ftp: loaded support on port[0] = 21 14:18:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:40 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 774.127006][T23189] FAULT_INJECTION: forcing a failure. [ 774.127006][T23189] name failslab, interval 1, probability 0, space 0, times 0 [ 774.147468][T23189] CPU: 1 PID: 23189 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 774.156573][T23189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.166631][T23189] Call Trace: [ 774.169935][T23189] dump_stack+0x1db/0x2d0 [ 774.174276][T23189] ? dump_stack_print_info.cold+0x20/0x20 [ 774.180012][T23189] should_fail.cold+0xa/0x14 [ 774.184616][T23189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 774.190437][T23189] ? ___might_sleep+0x1e7/0x310 [ 774.195289][T23189] ? arch_local_save_flags+0x50/0x50 [ 774.200584][T23189] ? __lock_acquire+0x572/0x4a10 [ 774.205542][T23189] __should_failslab+0x121/0x190 [ 774.210489][T23189] should_failslab+0x9/0x14 [ 774.215027][T23189] kmem_cache_alloc+0x2be/0x710 [ 774.219883][T23189] ? mark_held_locks+0xf0/0xf0 [ 774.224655][T23189] ext4_alloc_inode+0xa5/0x860 [ 774.229426][T23189] ? ratelimit_state_init+0xb0/0xb0 [ 774.234628][T23189] ? __find_get_block+0xf20/0xf20 [ 774.239670][T23189] ? ext4_map_blocks+0x40f/0x1b90 [ 774.244711][T23189] ? is_bpf_text_address+0xd3/0x170 [ 774.249923][T23189] ? add_lock_to_list.isra.0+0x450/0x450 [ 774.255558][T23189] ? add_lock_to_list.isra.0+0x450/0x450 [ 774.261190][T23189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.267432][T23189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.273676][T23189] ? ratelimit_state_init+0xb0/0xb0 [ 774.278880][T23189] alloc_inode+0x66/0x190 [ 774.283211][T23189] new_inode_pseudo+0x71/0x1b0 [ 774.287994][T23189] ? prune_icache_sb+0x1c0/0x1c0 [ 774.292947][T23189] new_inode+0x1f/0x40 [ 774.297017][T23189] __ext4_new_inode+0x454/0x6eb0 [ 774.301964][T23189] ? rcu_softirq_qs+0x20/0x20 [ 774.306656][T23189] ? is_bpf_text_address+0xd3/0x170 [ 774.311873][T23189] ? ext4_free_inode+0x1a30/0x1a30 [ 774.316997][T23189] ? unwind_get_return_address+0x61/0xa0 [ 774.322664][T23189] ? __save_stack_trace+0x8a/0xf0 [ 774.327714][T23189] ? save_stack+0xa9/0xd0 [ 774.332046][T23189] ? __kasan_slab_free+0x102/0x150 [ 774.337162][T23189] ? kasan_slab_free+0xe/0x10 [ 774.341854][T23189] ? kmem_cache_free+0x86/0x260 [ 774.346700][T23189] ? putname+0xef/0x130 [ 774.350853][T23189] ? filename_create+0x29d/0x5a0 [ 774.355788][T23189] ? do_mkdirat+0xcf/0x2f0 [ 774.360215][T23189] ? __x64_sys_mkdir+0x5c/0x80 [ 774.365025][T23189] ? do_syscall_64+0x1a3/0x800 [ 774.369790][T23189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.375883][T23189] ? trace_hardirqs_off+0xb8/0x310 [ 774.380994][T23189] ? print_usage_bug+0xd0/0xd0 [ 774.385756][T23189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.392002][T23189] ? __dquot_initialize+0x632/0xda0 [ 774.397205][T23189] ? d_instantiate_anon+0x30/0x30 [ 774.402242][T23189] ? dquot_get_next_dqblk+0x180/0x180 [ 774.407616][T23189] ? check_preemption_disabled+0x48/0x290 [ 774.413366][T23189] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 774.419015][T23189] ext4_mkdir+0x45a/0xef0 [ 774.423368][T23189] ? ext4_init_dot_dotdot+0x520/0x520 [ 774.428743][T23189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.434987][T23189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.441228][T23189] ? security_inode_permission+0xd5/0x110 [ 774.447027][T23189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.453280][T23189] ? security_inode_mkdir+0xee/0x120 [ 774.458567][T23189] vfs_mkdir+0x433/0x690 [ 774.462811][T23189] do_mkdirat+0x271/0x2f0 [ 774.467156][T23189] ? __ia32_sys_mknod+0xb0/0xb0 [ 774.472004][T23189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.478087][T23189] ? trace_hardirqs_off_caller+0x300/0x300 [ 774.483905][T23189] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 774.489405][T23189] __x64_sys_mkdir+0x5c/0x80 [ 774.493996][T23189] do_syscall_64+0x1a3/0x800 [ 774.498590][T23189] ? syscall_return_slowpath+0x5f0/0x5f0 [ 774.504223][T23189] ? prepare_exit_to_usermode+0x232/0x3b0 [ 774.509942][T23189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 774.515492][T23189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.521383][T23189] RIP: 0033:0x4574b7 [ 774.525270][T23189] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 774.544865][T23189] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 774.553271][T23189] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 774.561237][T23189] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 774.569206][T23189] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 774.577169][T23189] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 774.585148][T23189] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 774.636638][T23192] IPVS: ftp: loaded support on port[0] = 21 14:18:44 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x44000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:18:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7100}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:44 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:18:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:44 executing program 5 (fault-call:2 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:44 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x10000) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000400)={{0x2, 0x4623, @multicast1}, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x2, {0x2, 0x800000004e20, @multicast1}, 'team_sl\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'irlan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="47d370cd4e4514c94c19fd167531a37b27a7bc660000000800000028c7"]}) 14:18:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 778.149836][T23204] IPVS: ftp: loaded support on port[0] = 21 [ 778.183705][T23203] FAULT_INJECTION: forcing a failure. [ 778.183705][T23203] name failslab, interval 1, probability 0, space 0, times 0 [ 778.244861][T23203] CPU: 0 PID: 23203 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 778.253929][T23203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.257255][T23211] IPVS: ftp: loaded support on port[0] = 21 [ 778.263985][T23203] Call Trace: [ 778.273260][T23203] dump_stack+0x1db/0x2d0 [ 778.277608][T23203] ? dump_stack_print_info.cold+0x20/0x20 [ 778.277643][T23203] should_fail.cold+0xa/0x14 [ 778.277663][T23203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 778.293755][T23203] ? ___might_sleep+0x1e7/0x310 [ 778.298630][T23203] ? arch_local_save_flags+0x50/0x50 [ 778.303959][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.310210][T23203] __should_failslab+0x121/0x190 [ 778.310232][T23203] should_failslab+0x9/0x14 [ 778.310249][T23203] kmem_cache_alloc+0x2be/0x710 [ 778.310283][T23203] ext4_mb_new_blocks+0x6e8/0x4850 [ 778.324548][T23203] ? save_stack+0xa9/0xd0 [ 778.324583][T23203] ? ext4_discard_preallocations+0x1400/0x1400 [ 778.324601][T23203] ? print_usage_bug+0xd0/0xd0 [ 778.324615][T23203] ? save_stack+0xa9/0xd0 [ 778.324645][T23203] ? __lock_is_held+0xb6/0x140 [ 778.324658][T23203] ? ext4_getblk+0x11b/0x610 [ 778.324672][T23203] ? add_lock_to_list.isra.0+0x450/0x450 [ 778.324687][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.324699][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.324717][T23203] ? check_preemption_disabled+0x48/0x290 [ 778.324740][T23203] ? __lock_is_held+0xb6/0x140 [ 778.324776][T23203] ? rcu_read_lock_sched_held+0x110/0x130 [ 778.334206][T23203] ? __kmalloc+0x5d5/0x740 [ 778.334317][T23203] ? ext4_find_extent+0x76e/0x9d0 [ 778.334340][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.345231][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.345248][T23203] ? ext4_inode_to_goal_block+0x2e9/0x400 [ 778.345271][T23203] ext4_ext_map_blocks+0x36d0/0x60a0 [ 778.364533][T23203] ? ext4_ext_release+0x10/0x10 [ 778.364572][T23203] ? ___might_sleep+0x1e7/0x310 [ 778.364595][T23203] ? lock_release+0xc40/0xc40 [ 778.382748][T23203] ? ext4_es_lookup_extent+0x478/0xdd0 [ 778.382781][T23203] ? down_write+0x8a/0x130 [ 778.382795][T23203] ? ext4_map_blocks+0x922/0x1b90 [ 778.382809][T23203] ? down_read+0x120/0x120 [ 778.382833][T23203] ext4_map_blocks+0x98a/0x1b90 [ 778.382857][T23203] ? ext4_issue_zeroout+0x190/0x190 [ 778.382889][T23203] ext4_getblk+0x11b/0x610 [ 778.408988][T23203] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.409025][T23203] ? ext4_iomap_begin+0x1430/0x1430 [ 778.409043][T23203] ? print_usage_bug+0xd0/0xd0 [ 778.409058][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.409094][T23203] ? __dquot_initialize+0x632/0xda0 [ 778.474295][T23203] ? d_instantiate_anon+0x30/0x30 [ 778.474317][T23203] ext4_bread+0x8d/0x2b0 [ 778.474334][T23203] ? ext4_getblk+0x610/0x610 [ 778.474352][T23203] ? check_preemption_disabled+0x48/0x290 [ 778.474378][T23203] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 778.474400][T23203] ext4_append+0x150/0x370 [ 778.474419][T23203] ext4_mkdir+0x6b1/0xef0 [ 778.474443][T23203] ? ext4_init_dot_dotdot+0x520/0x520 [ 778.474458][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.474478][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.506904][T23203] ? security_inode_permission+0xd5/0x110 [ 778.506924][T23203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.506938][T23203] ? security_inode_mkdir+0xee/0x120 [ 778.506955][T23203] vfs_mkdir+0x433/0x690 [ 778.506976][T23203] do_mkdirat+0x271/0x2f0 [ 778.553826][T23203] ? __ia32_sys_mknod+0xb0/0xb0 [ 778.553861][T23203] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.553898][T23203] ? trace_hardirqs_off_caller+0x300/0x300 [ 778.596527][T23203] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 778.601997][T23203] __x64_sys_mkdir+0x5c/0x80 [ 778.606594][T23203] do_syscall_64+0x1a3/0x800 [ 778.611209][T23203] ? syscall_return_slowpath+0x5f0/0x5f0 [ 778.616851][T23203] ? prepare_exit_to_usermode+0x232/0x3b0 [ 778.616875][T23203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.616904][T23203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.616917][T23203] RIP: 0033:0x4574b7 [ 778.616937][T23203] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 778.657543][T23203] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 778.665998][T23203] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 778.673981][T23203] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 778.681955][T23203] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 14:18:44 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 778.689937][T23203] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 778.697909][T23203] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:44 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000180)=""/50) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000001c0)=0xfffb) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000200)={0xb4e9d55044c87833, 0x9, "f35fe3d7dcdd024a376bf8f034a91f43de3fa1816421cbe728f564fa936b08d7", 0x200, 0x4, 0x8, 0x64, 0x101, 0x7, 0x100, 0x7, [0x9, 0x9, 0xa9d, 0x2]}) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7fffffff) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000100)={0xa, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) 14:18:45 executing program 5 (fault-call:2 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 778.986512][T23231] FAULT_INJECTION: forcing a failure. [ 778.986512][T23231] name failslab, interval 1, probability 0, space 0, times 0 [ 778.989595][T23228] IPVS: ftp: loaded support on port[0] = 21 [ 779.019008][T23231] CPU: 0 PID: 23231 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 779.028080][T23231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.038138][T23231] Call Trace: [ 779.041442][T23231] dump_stack+0x1db/0x2d0 [ 779.045780][T23231] ? dump_stack_print_info.cold+0x20/0x20 [ 779.051523][T23231] should_fail.cold+0xa/0x14 [ 779.056146][T23231] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.061967][T23231] ? ___might_sleep+0x1e7/0x310 [ 779.066870][T23231] ? arch_local_save_flags+0x50/0x50 [ 779.072183][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.072208][T23231] __should_failslab+0x121/0x190 [ 779.072227][T23231] should_failslab+0x9/0x14 [ 779.072242][T23231] kmem_cache_alloc+0x2be/0x710 [ 779.072267][T23231] ext4_mb_new_blocks+0x6e8/0x4850 [ 779.072288][T23231] ? save_stack+0xa9/0xd0 [ 779.072346][T23231] ? ext4_discard_preallocations+0x1400/0x1400 [ 779.092901][T23231] ? lockdep_hardirqs_on+0x418/0x5d0 [ 779.092922][T23231] ? retint_kernel+0x2d/0x2d [ 779.092951][T23231] ? print_usage_bug+0xd0/0xd0 [ 779.092966][T23231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.092983][T23231] ? __lock_is_held+0xb6/0x140 [ 779.092998][T23231] ? ext4_getblk+0x11b/0x610 [ 779.093012][T23231] ? add_lock_to_list.isra.0+0x450/0x450 [ 779.093028][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.093064][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.118482][T23231] ? check_preemption_disabled+0x48/0x290 [ 779.118508][T23231] ? __lock_is_held+0xb6/0x140 [ 779.118536][T23231] ? rcu_read_lock_sched_held+0x110/0x130 [ 779.161814][T23231] ? __kmalloc+0x5d5/0x740 [ 779.161838][T23231] ? ext4_find_extent+0x76e/0x9d0 [ 779.161857][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.161871][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.161886][T23231] ? ext4_inode_to_goal_block+0x2e9/0x400 [ 779.161910][T23231] ext4_ext_map_blocks+0x36d0/0x60a0 [ 779.161943][T23231] ? ext4_ext_release+0x10/0x10 [ 779.161976][T23231] ? ___might_sleep+0x1e7/0x310 [ 779.200038][T23231] ? lock_release+0xc40/0xc40 [ 779.200074][T23231] ? ext4_es_lookup_extent+0x478/0xdd0 [ 779.200102][T23231] ? down_write+0x8a/0x130 [ 779.225162][T23231] ? ext4_map_blocks+0x922/0x1b90 [ 779.225181][T23231] ? down_read+0x120/0x120 [ 779.225206][T23231] ext4_map_blocks+0x98a/0x1b90 [ 779.225233][T23231] ? ext4_issue_zeroout+0x190/0x190 [ 779.225263][T23231] ext4_getblk+0x11b/0x610 [ 779.225302][T23231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.239124][T23231] ? ext4_iomap_begin+0x1430/0x1430 [ 779.259606][T23231] ? print_usage_bug+0xd0/0xd0 [ 779.259632][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.259649][T23231] ? __dquot_initialize+0x632/0xda0 [ 779.259674][T23231] ? d_instantiate_anon+0x30/0x30 [ 779.281124][T23231] ext4_bread+0x8d/0x2b0 [ 779.281142][T23231] ? ext4_getblk+0x610/0x610 [ 779.281161][T23231] ? check_preemption_disabled+0x48/0x290 [ 779.281193][T23231] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 779.281213][T23231] ext4_append+0x150/0x370 [ 779.306339][T23231] ext4_mkdir+0x6b1/0xef0 [ 779.306379][T23231] ? ext4_init_dot_dotdot+0x520/0x520 [ 779.306397][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.306416][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.326751][T23231] ? security_inode_permission+0xd5/0x110 [ 779.326772][T23231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.326787][T23231] ? security_inode_mkdir+0xee/0x120 [ 779.326807][T23231] vfs_mkdir+0x433/0x690 [ 779.326835][T23231] do_mkdirat+0x271/0x2f0 [ 779.358792][T23231] ? __ia32_sys_mknod+0xb0/0xb0 [ 779.358814][T23231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.358832][T23231] ? trace_hardirqs_off_caller+0x300/0x300 [ 779.358851][T23231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.358870][T23231] __x64_sys_mkdir+0x5c/0x80 [ 779.385628][T23231] do_syscall_64+0x1a3/0x800 [ 779.385649][T23231] ? syscall_return_slowpath+0x5f0/0x5f0 [ 779.385683][T23231] ? prepare_exit_to_usermode+0x232/0x3b0 [ 779.385703][T23231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.385742][T23231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.401654][T23231] RIP: 0033:0x4574b7 [ 779.401672][T23231] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.401681][T23231] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 779.401697][T23231] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574b7 [ 779.401707][T23231] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 00000000200002c0 [ 779.401716][T23231] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 779.401725][T23231] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 779.401748][T23231] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:45 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x3b7, 0x0, 0x0, 0x0, 0x904bac884982d45}, 0xfffffffffffffffc}], 0x40000000000028a, 0x3, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r0, 0x406, r2) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10, 0x80800) getsockname$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0xfffffd8c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:18:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 779.730489][T23243] IPVS: ftp: loaded support on port[0] = 21 [ 779.745943][T23234] IPVS: ftp: loaded support on port[0] = 21 [ 780.495476][T23243] IPVS: ftp: loaded support on port[0] = 21 14:18:49 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:18:49 executing program 5 (fault-call:2 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 783.439822][T23255] FAULT_INJECTION: forcing a failure. [ 783.439822][T23255] name failslab, interval 1, probability 0, space 0, times 0 [ 783.452768][T23255] CPU: 0 PID: 23255 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 783.461789][T23255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.471852][T23255] Call Trace: [ 783.475156][T23255] dump_stack+0x1db/0x2d0 [ 783.479528][T23255] ? dump_stack_print_info.cold+0x20/0x20 [ 783.485314][T23255] should_fail.cold+0xa/0x14 14:18:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff0f}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 783.489951][T23255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 783.495795][T23255] ? __sigqueue_alloc+0x235/0x710 [ 783.500825][T23255] ? find_held_lock+0x35/0x120 [ 783.501956][T23259] IPVS: ftp: loaded support on port[0] = 21 [ 783.505601][T23255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.517810][T23255] __should_failslab+0x121/0x190 [ 783.522758][T23255] should_failslab+0x9/0x14 [ 783.522773][T23255] kmem_cache_alloc+0x47/0x710 [ 783.522799][T23255] __sigqueue_alloc+0x3ca/0x710 [ 783.522816][T23255] ? dequeue_signal+0x6a0/0x6a0 [ 783.522837][T23255] ? __lock_acquire+0x572/0x4a10 [ 783.522868][T23255] ? mark_held_locks+0xf0/0xf0 [ 783.522904][T23255] __send_signal+0xdbb/0x1a10 [ 783.556168][T23255] ? prepare_signal+0xe10/0xe10 [ 783.556205][T23255] ? lock_acquire+0x1db/0x570 [ 783.565729][T23255] ? force_sig_info+0x55/0x310 [ 783.570534][T23255] ? kasan_check_write+0x14/0x20 [ 783.575481][T23255] ? do_raw_spin_lock+0x156/0x360 [ 783.580507][T23255] ? lock_release+0xc40/0xc40 [ 783.585185][T23255] ? rwlock_bug.part.0+0x90/0x90 [ 783.585201][T23255] ? trace_hardirqs_on_caller+0x310/0x310 [ 783.585223][T23255] send_signal+0x49/0xd0 [ 783.595866][T23255] force_sig_info+0x251/0x310 [ 783.595893][T23255] force_sig_fault+0x11b/0x180 [ 783.609556][T23255] ? force_sigsegv+0x120/0x120 [ 783.614326][T23255] ? kasan_check_write+0x14/0x20 [ 783.614339][T23255] ? up_read+0x212/0x2b0 [ 783.614369][T23255] __bad_area_nosemaphore+0x332/0x420 [ 783.623505][T23255] ? vmacache_find+0x65/0x310 [ 783.623531][T23255] bad_area+0x69/0x80 [ 783.623549][T23255] __do_page_fault+0x996/0xda0 [ 783.623569][T23255] ? __ia32_sys_mknod+0xb0/0xb0 [ 783.637547][T23255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.637575][T23255] do_page_fault+0xe6/0x7d8 [ 783.637589][T23255] ? trace_hardirqs_on_caller+0xc0/0x310 [ 783.637609][T23255] ? vmalloc_sync_all+0x30/0x30 [ 783.668220][T23255] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 783.674422][T23255] ? syscall_return_slowpath+0x5f0/0x5f0 [ 783.680064][T23255] ? prepare_exit_to_usermode+0x232/0x3b0 [ 783.685780][T23255] ? page_fault+0x8/0x30 [ 783.685800][T23255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 783.685817][T23255] ? page_fault+0x8/0x30 [ 783.685832][T23255] page_fault+0x1e/0x30 [ 783.685844][T23255] RIP: 0033:0x451d4f [ 783.685864][T23255] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 783.699843][T23255] RSP: 002b:00007f93e78f8a88 EFLAGS: 00010283 14:18:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x96f37}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 783.699856][T23255] RAX: 00007f93e78f8b30 RBX: 0000000000000010 RCX: 0000000000000000 [ 783.699866][T23255] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f93e78f8b30 [ 783.699875][T23255] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 783.699885][T23255] R10: 0000000000000075 R11: 00000000004e0ea0 R12: 0000000000000005 [ 783.699894][T23255] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:50 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x3ffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f0000000000)={0x21, 0x7, 0x1, {0x18, 'md5sumsecuritywlan1$eth0'}}, 0x21) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:50 executing program 5 (fault-call:2 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa8a90}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 784.224816][T23272] FAULT_INJECTION: forcing a failure. [ 784.224816][T23272] name failslab, interval 1, probability 0, space 0, times 0 [ 784.274054][T23272] CPU: 1 PID: 23272 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 784.283135][T23272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.293203][T23272] Call Trace: [ 784.296516][T23272] dump_stack+0x1db/0x2d0 [ 784.300873][T23272] ? dump_stack_print_info.cold+0x20/0x20 [ 784.306602][T23272] ? add_lock_to_list.isra.0+0x450/0x450 [ 784.312270][T23272] should_fail.cold+0xa/0x14 [ 784.312292][T23272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 784.312315][T23272] ? ___might_sleep+0x1e7/0x310 [ 784.312336][T23272] ? arch_local_save_flags+0x50/0x50 [ 784.322740][T23272] ? lock_downgrade+0xc40/0xc40 [ 784.322765][T23272] ? __check_object_size+0xa3/0x790 [ 784.322786][T23272] __should_failslab+0x121/0x190 [ 784.322813][T23272] should_failslab+0x9/0x14 [ 784.352398][T23272] kmem_cache_alloc_trace+0x2d1/0x760 [ 784.357816][T23272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 784.364085][T23272] ? _copy_from_user+0xdd/0x150 [ 784.368946][T23272] copy_mount_options+0x5c/0x440 [ 784.373886][T23272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 784.380131][T23272] ksys_mount+0xa7/0x150 [ 784.384386][T23272] __x64_sys_mount+0xbe/0x150 [ 784.389070][T23272] do_syscall_64+0x1a3/0x800 [ 784.393712][T23272] ? syscall_return_slowpath+0x5f0/0x5f0 [ 784.399347][T23272] ? prepare_exit_to_usermode+0x232/0x3b0 [ 784.405090][T23272] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.410685][T23272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.416594][T23272] RIP: 0033:0x45ab0a [ 784.420489][T23272] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 784.440087][T23272] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 784.448501][T23272] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 000000000045ab0a [ 784.456469][T23272] RDX: 00007f93e78f8ad0 RSI: 00000000200002c0 RDI: 00007f93e78f8af0 [ 784.464433][T23272] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 784.472399][T23272] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 784.480371][T23272] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:50 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000040)={0x9, 0x8, 0x2, 0x7ff, 0x10, 0x7}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:18:50 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='hybla\x00', 0x6) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) 14:18:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x100000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:50 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fd) 14:18:50 executing program 5 (fault-call:2 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 784.728025][T23284] FAULT_INJECTION: forcing a failure. [ 784.728025][T23284] name failslab, interval 1, probability 0, space 0, times 0 [ 784.766017][T23287] IPVS: ftp: loaded support on port[0] = 21 [ 784.778880][T23284] CPU: 1 PID: 23284 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 784.787943][T23284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.798022][T23284] Call Trace: [ 784.801325][T23284] dump_stack+0x1db/0x2d0 [ 784.805688][T23284] ? dump_stack_print_info.cold+0x20/0x20 [ 784.811459][T23284] should_fail.cold+0xa/0x14 [ 784.816057][T23284] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 784.821881][T23284] ? ___might_sleep+0x1e7/0x310 [ 784.826737][T23284] ? arch_local_save_flags+0x50/0x50 [ 784.832040][T23284] __should_failslab+0x121/0x190 [ 784.836990][T23284] should_failslab+0x9/0x14 [ 784.841500][T23284] __kmalloc_track_caller+0x2d8/0x740 [ 784.846873][T23284] ? strncpy_from_user+0x4e0/0x4e0 [ 784.852003][T23284] ? strndup_user+0x77/0xd0 [ 784.856512][T23284] memdup_user+0x26/0xb0 [ 784.860374][T23294] IPVS: ftp: loaded support on port[0] = 21 [ 784.860777][T23284] strndup_user+0x77/0xd0 [ 784.871024][T23284] ksys_mount+0x3c/0x150 [ 784.871043][T23284] __x64_sys_mount+0xbe/0x150 [ 784.871065][T23284] do_syscall_64+0x1a3/0x800 [ 784.871088][T23284] ? syscall_return_slowpath+0x5f0/0x5f0 [ 784.890155][T23284] ? prepare_exit_to_usermode+0x232/0x3b0 [ 784.895888][T23284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.901462][T23284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.901476][T23284] RIP: 0033:0x45ab0a 14:18:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x400000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 784.901493][T23284] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 784.901502][T23284] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 784.901517][T23284] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 000000000045ab0a [ 784.901526][T23284] RDX: 00007f93e78f8ad0 RSI: 00000000200002c0 RDI: 00007f93e78f8af0 [ 784.901536][T23284] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 784.901544][T23284] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 784.901560][T23284] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 [ 785.239976][T23292] IPVS: ftp: loaded support on port[0] = 21 [ 785.615009][T23294] IPVS: ftp: loaded support on port[0] = 21 14:18:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10800a}) 14:18:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:52 executing program 5 (fault-call:2 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:52 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) exit_group(0x20) 14:18:52 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setflags(r2, 0x2, 0x0) [ 786.657344][T23308] IPVS: ftp: loaded support on port[0] = 21 [ 786.676698][T23310] IPVS: ftp: loaded support on port[0] = 21 [ 786.685625][T23313] FAULT_INJECTION: forcing a failure. [ 786.685625][T23313] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 786.698827][T23313] CPU: 1 PID: 23313 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 786.707837][T23313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.717885][T23313] Call Trace: [ 786.721193][T23313] dump_stack+0x1db/0x2d0 [ 786.725538][T23313] ? dump_stack_print_info.cold+0x20/0x20 [ 786.731263][T23313] ? __lock_acquire+0x572/0x4a10 [ 786.736214][T23313] should_fail.cold+0xa/0x14 [ 786.740816][T23313] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 786.746619][T23313] ? mark_held_locks+0xf0/0xf0 [ 786.746645][T23313] ? save_stack+0x45/0xd0 [ 786.746660][T23313] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 786.746674][T23313] ? kasan_kmalloc+0x9/0x10 [ 786.746688][T23313] ? __kmalloc_track_caller+0x158/0x740 [ 786.746711][T23313] ? memdup_user+0x26/0xb0 [ 786.776176][T23313] ? strndup_user+0x77/0xd0 [ 786.780675][T23313] ? ksys_mount+0x7b/0x150 [ 786.785094][T23313] should_fail_alloc_page+0x50/0x60 [ 786.790299][T23313] __alloc_pages_nodemask+0x323/0xdc0 [ 786.795676][T23313] ? add_lock_to_list.isra.0+0x450/0x450 [ 786.801317][T23313] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 786.807036][T23313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.807069][T23313] ? ___might_sleep+0x1e7/0x310 [ 786.807090][T23313] ? trace_hardirqs_off+0xb8/0x310 [ 786.823247][T23313] cache_grow_begin+0x9c/0x8c0 [ 786.828101][T23313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.834351][T23313] ? check_preemption_disabled+0x48/0x290 [ 786.840088][T23313] kmem_cache_alloc_trace+0x67f/0x760 [ 786.845475][T23313] copy_mount_options+0x5c/0x440 [ 786.850412][T23313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.850430][T23313] ksys_mount+0xa7/0x150 [ 786.850447][T23313] __x64_sys_mount+0xbe/0x150 [ 786.850468][T23313] do_syscall_64+0x1a3/0x800 [ 786.850494][T23313] ? syscall_return_slowpath+0x5f0/0x5f0 [ 786.875798][T23313] ? prepare_exit_to_usermode+0x232/0x3b0 [ 786.881521][T23313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.887085][T23313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.892982][T23313] RIP: 0033:0x45ab0a [ 786.896881][T23313] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 786.916478][T23313] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 786.916494][T23313] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 000000000045ab0a [ 786.916504][T23313] RDX: 00007f93e78f8ad0 RSI: 00000000200002c0 RDI: 00007f93e78f8af0 [ 786.916514][T23313] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 786.916522][T23313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 14:18:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:53 executing program 0: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="64020000", @ANYRES16], 0x2}}, 0x4000000) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000000580), 0x4000000000002f4, 0x0) [ 786.916531][T23313] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:53 executing program 5 (fault-call:2 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 787.200880][T23328] FAULT_INJECTION: forcing a failure. [ 787.200880][T23328] name failslab, interval 1, probability 0, space 0, times 0 [ 787.271570][T23328] CPU: 0 PID: 23328 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 787.280643][T23328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.290691][T23328] Call Trace: [ 787.293989][T23328] dump_stack+0x1db/0x2d0 [ 787.298328][T23328] ? dump_stack_print_info.cold+0x20/0x20 [ 787.304053][T23328] ? add_lock_to_list.isra.0+0x450/0x450 [ 787.309695][T23328] should_fail.cold+0xa/0x14 [ 787.314289][T23328] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 787.320112][T23328] ? ___might_sleep+0x1e7/0x310 [ 787.325005][T23328] ? arch_local_save_flags+0x50/0x50 [ 787.330288][T23328] ? lock_downgrade+0xc40/0xc40 [ 787.335137][T23328] ? lock_release+0xc40/0xc40 [ 787.339820][T23328] __should_failslab+0x121/0x190 [ 787.344761][T23328] should_failslab+0x9/0x14 [ 787.349260][T23328] __kmalloc_track_caller+0x2d8/0x740 [ 787.354662][T23328] ? strncpy_from_user+0x4e0/0x4e0 [ 787.359768][T23328] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 787.366091][T23328] ? strndup_user+0x77/0xd0 [ 787.370594][T23328] memdup_user+0x26/0xb0 [ 787.374839][T23328] strndup_user+0x77/0xd0 [ 787.379177][T23328] ksys_mount+0x7b/0x150 [ 787.383456][T23328] __x64_sys_mount+0xbe/0x150 [ 787.388127][T23328] do_syscall_64+0x1a3/0x800 [ 787.392717][T23328] ? syscall_return_slowpath+0x5f0/0x5f0 [ 787.398347][T23328] ? prepare_exit_to_usermode+0x232/0x3b0 [ 787.404105][T23328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.409700][T23328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.415586][T23328] RIP: 0033:0x45ab0a [ 787.419480][T23328] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 787.439075][T23328] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 787.447520][T23328] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 000000000045ab0a [ 787.455495][T23328] RDX: 00007f93e78f8ad0 RSI: 00000000200002c0 RDI: 00007f93e78f8af0 [ 787.463474][T23328] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 14:18:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 787.471435][T23328] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 787.479425][T23328] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:53 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="7fb19ddd375f69d983f9b2c1dc7492890ef4d26ad28a776b6345a1a15782b70d0ffd8147af22974ec4549f2eb5dae17e462adbdd1effd6f943579ef44d5447a533b083da217e9d306451abeb67db8013b1b1dc311cb9f74e4672f85230a0ff999c9217d3353e29a96d7ad79fba0823272763824648b33adba5e444da1d4b1bbd5c4316e50da5b49dd33f6371e19056", 0x8f, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) r5 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x40, 0x1a1001) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) r7 = msgget$private(0x0, 0x130) msgctl$IPC_RMID(r7, 0x0) r8 = accept(r2, &(0x7f00000001c0)=@caif=@dbg, &(0x7f0000000080)=0x80) connect$llc(r8, &(0x7f0000000240)={0x1a, 0x327, 0x6, 0xfffffffffffffffd, 0x3, 0x156e8000000, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 787.705576][T23336] IPVS: ftp: loaded support on port[0] = 21 [ 787.869766][T23336] IPVS: ftp: loaded support on port[0] = 21 14:18:55 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:55 executing program 5 (fault-call:2 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448c9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:18:55 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) open_by_handle_at(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:18:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) listxattr(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 14:18:55 executing program 3: unshare(0x10020102) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10001, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1f, 0x80) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 789.801760][T23348] FAULT_INJECTION: forcing a failure. [ 789.801760][T23348] name failslab, interval 1, probability 0, space 0, times 0 [ 789.828214][T23348] CPU: 0 PID: 23348 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 789.837244][T23348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.847291][T23348] Call Trace: [ 789.850590][T23348] dump_stack+0x1db/0x2d0 [ 789.854951][T23348] ? dump_stack_print_info.cold+0x20/0x20 [ 789.860672][T23348] ? __loop_clr_fd+0x4ee/0xc90 [ 789.865430][T23348] ? lo_ioctl+0x44a/0x23e0 [ 789.869843][T23348] ? blkdev_ioctl+0x10e0/0x2120 [ 789.874736][T23348] ? block_ioctl+0xee/0x130 [ 789.879239][T23348] ? do_vfs_ioctl+0x107b/0x17d0 [ 789.884096][T23348] ? __x64_sys_ioctl+0x73/0xb0 [ 789.888870][T23348] should_fail.cold+0xa/0x14 [ 789.893597][T23348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 789.899419][T23348] ? ___might_sleep+0x1e7/0x310 [ 789.904290][T23348] ? arch_local_save_flags+0x50/0x50 [ 789.909587][T23348] __should_failslab+0x121/0x190 [ 789.914541][T23348] should_failslab+0x9/0x14 [ 789.919045][T23348] __kmalloc+0x2dc/0x740 [ 789.923293][T23348] ? rcu_read_lock_sched_held+0x110/0x130 [ 789.929032][T23348] ? kobject_get_path+0xc4/0x1b0 [ 789.933978][T23348] kobject_get_path+0xc4/0x1b0 [ 789.938752][T23348] kobject_uevent_env+0x31f/0x102b [ 789.943862][T23348] ? down_read+0x120/0x120 [ 789.948326][T23348] kobject_uevent+0x20/0x26 [ 789.952841][T23348] __loop_clr_fd+0x4ee/0xc90 [ 789.957438][T23348] lo_ioctl+0x44a/0x23e0 [ 789.961685][T23348] ? add_lock_to_list.isra.0+0x450/0x450 [ 789.967318][T23348] ? rcu_softirq_qs+0x20/0x20 [ 789.972009][T23348] ? lo_rw_aio+0x1e50/0x1e50 [ 789.976628][T23348] ? __fget+0x473/0x710 [ 789.980790][T23348] ? lo_rw_aio+0x1e50/0x1e50 [ 789.985413][T23348] blkdev_ioctl+0x10e0/0x2120 [ 789.990092][T23348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.996332][T23348] ? blkpg_ioctl+0xc10/0xc10 [ 790.000937][T23348] ? lock_downgrade+0xc40/0xc40 [ 790.005791][T23348] ? kasan_check_read+0x11/0x20 [ 790.010649][T23348] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 790.016642][T23348] ? rcu_read_unlock_special+0x380/0x380 [ 790.022310][T23348] ? __fget+0x49a/0x710 [ 790.026482][T23348] block_ioctl+0xee/0x130 [ 790.030815][T23348] ? blkdev_fallocate+0x410/0x410 [ 790.035843][T23348] do_vfs_ioctl+0x107b/0x17d0 [ 790.040531][T23348] ? ioctl_preallocate+0x2f0/0x2f0 [ 790.045655][T23348] ? __fget_light+0x2db/0x420 [ 790.050338][T23348] ? fget_raw+0x20/0x20 [ 790.054506][T23348] ? ksys_mount+0x100/0x150 [ 790.059015][T23348] ? do_syscall_64+0x8c/0x800 [ 790.063708][T23348] ? do_syscall_64+0x8c/0x800 [ 790.068393][T23348] ? lockdep_hardirqs_on+0x418/0x5d0 [ 790.073682][T23348] ? security_file_ioctl+0x93/0xc0 [ 790.078801][T23348] ksys_ioctl+0xab/0xd0 [ 790.082963][T23348] __x64_sys_ioctl+0x73/0xb0 [ 790.087557][T23348] do_syscall_64+0x1a3/0x800 [ 790.092153][T23348] ? syscall_return_slowpath+0x5f0/0x5f0 [ 790.097788][T23348] ? prepare_exit_to_usermode+0x232/0x3b0 [ 790.103518][T23348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 790.109081][T23348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.114986][T23348] RIP: 0033:0x457f07 [ 790.118880][T23348] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 790.138484][T23348] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:18:56 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 790.146894][T23348] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 0000000000457f07 [ 790.154863][T23348] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 790.162835][T23348] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 790.170803][T23348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 790.178770][T23348] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:56 executing program 5 (fault-call:2 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 790.289198][T23364] IPVS: ftp: loaded support on port[0] = 21 [ 790.414829][T23376] FAULT_INJECTION: forcing a failure. [ 790.414829][T23376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 790.428106][T23376] CPU: 1 PID: 23376 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 790.437125][T23376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.447167][T23376] Call Trace: [ 790.450458][T23376] dump_stack+0x1db/0x2d0 [ 790.454809][T23376] ? dump_stack_print_info.cold+0x20/0x20 [ 790.460524][T23376] ? __lock_acquire+0x572/0x4a10 [ 790.465467][T23376] should_fail.cold+0xa/0x14 [ 790.470055][T23376] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 790.475859][T23376] ? mark_held_locks+0xf0/0xf0 [ 790.481288][T23376] ? save_stack+0x45/0xd0 [ 790.485629][T23376] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 790.491429][T23376] ? kasan_kmalloc+0x9/0x10 [ 790.495925][T23376] ? __kmalloc_track_caller+0x158/0x740 [ 790.501466][T23376] ? memdup_user+0x26/0xb0 [ 790.505893][T23376] ? strndup_user+0x77/0xd0 [ 790.510405][T23376] ? ksys_mount+0x7b/0x150 [ 790.514817][T23376] should_fail_alloc_page+0x50/0x60 [ 790.520014][T23376] __alloc_pages_nodemask+0x323/0xdc0 [ 790.525388][T23376] ? add_lock_to_list.isra.0+0x450/0x450 [ 790.531023][T23376] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 790.536743][T23376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.542998][T23376] ? ___might_sleep+0x1e7/0x310 [ 790.547852][T23376] ? trace_hardirqs_off+0xb8/0x310 [ 790.552975][T23376] cache_grow_begin+0x9c/0x8c0 [ 790.557736][T23376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 790.563977][T23376] ? check_preemption_disabled+0x48/0x290 [ 790.569696][T23376] kmem_cache_alloc_trace+0x67f/0x760 [ 790.575072][T23376] copy_mount_options+0x5c/0x440 [ 790.580008][T23376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 790.586249][T23376] ksys_mount+0xa7/0x150 [ 790.590486][T23376] __x64_sys_mount+0xbe/0x150 [ 790.595180][T23376] do_syscall_64+0x1a3/0x800 [ 790.599760][T23376] ? syscall_return_slowpath+0x5f0/0x5f0 [ 790.605406][T23376] ? prepare_exit_to_usermode+0x232/0x3b0 [ 790.611135][T23376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 790.616690][T23376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.622573][T23376] RIP: 0033:0x45ab0a [ 790.626468][T23376] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 790.646076][T23376] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 790.654474][T23376] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 000000000045ab0a [ 790.662433][T23376] RDX: 00007f93e78f8ad0 RSI: 00000000200002c0 RDI: 00007f93e78f8af0 [ 790.670425][T23376] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 790.678386][T23376] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 790.686348][T23376] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:18:56 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x80000) bind$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:18:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) listxattr(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 790.890263][T23372] IPVS: ftp: loaded support on port[0] = 21 [ 790.897305][T23391] IPVS: ftp: loaded support on port[0] = 21 14:18:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:18:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:18:57 executing program 0: open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x45000}], 0x1, 0x0) [ 791.640787][T23391] IPVS: ftp: loaded support on port[0] = 21 [ 792.004463][ T26] kauditd_printk_skb: 63 callbacks suppressed [ 792.004480][ T26] audit: type=1804 audit(1548166738.131:119): pid=23408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir840840913/syzkaller.Iesfic/35/bus" dev="sda1" ino=17391 res=1 [ 792.116485][ T26] audit: type=1804 audit(1548166738.131:120): pid=23408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir840840913/syzkaller.Iesfic/35/bus" dev="sda1" ino=17391 res=1 [ 792.208642][ T26] audit: type=1804 audit(1548166738.291:121): pid=23417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir840840913/syzkaller.Iesfic/35/bus" dev="sda1" ino=17391 res=1 [ 792.290580][ T26] audit: type=1804 audit(1548166738.291:122): pid=23416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir840840913/syzkaller.Iesfic/35/bus" dev="sda1" ino=17391 res=1 14:19:00 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@rose, @null, @netrom, @remote, @default, @rose, @null, @bcast]}, &(0x7f00000000c0)=0x48) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x5783, 0x80, 0x20, 0x9, 0xa, 0x5, 0x15, 0x1ff, 0xf2d, 0x3ff, 0x80000001, 0x6}) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xd37) 14:19:00 executing program 5 (fault-call:2 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x8000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:00 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}, 0xb1b0}], 0x40000000000009a, 0xfffffffffffffffc, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8040, 0x0) r5 = fcntl$dupfd(r3, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400400200) futimesat(r4, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x77359400}}) write$cgroup_int(r0, &(0x7f0000000000)=0x5, 0x12) 14:19:00 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:00 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="7fb19ddd375f69d983f9b2c1dc7492890ef4d26ad28a776b6345a1a15782b70d0ffd8147af22974ec4549f2eb5dae17e462adbdd1effd6f943579ef44d5447a533b083da217e9d306451abeb67db8013b1b1dc311cb9f74e4672f85230a0ff999c9217d3353e29a96d7ad79fba0823272763824648b33adba5e444da1d4b1bbd5c4316e50da5b49dd33f6371e19056", 0x8f, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) r5 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x40, 0x1a1001) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) r7 = msgget$private(0x0, 0x130) msgctl$IPC_RMID(r7, 0x0) r8 = accept(r2, &(0x7f00000001c0)=@caif=@dbg, &(0x7f0000000080)=0x80) connect$llc(r8, &(0x7f0000000240)={0x1a, 0x327, 0x6, 0xfffffffffffffffd, 0x3, 0x156e8000000, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 794.519725][T23432] IPVS: ftp: loaded support on port[0] = 21 [ 794.542987][T23429] FAULT_INJECTION: forcing a failure. [ 794.542987][T23429] name failslab, interval 1, probability 0, space 0, times 0 [ 794.556515][T23426] IPVS: ftp: loaded support on port[0] = 21 14:19:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 794.571428][T23429] CPU: 1 PID: 23429 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 794.580454][T23429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.580462][T23429] Call Trace: [ 794.580487][T23429] dump_stack+0x1db/0x2d0 [ 794.580514][T23429] ? dump_stack_print_info.cold+0x20/0x20 [ 794.592772][T23435] IPVS: ftp: loaded support on port[0] = 21 [ 794.593845][T23429] should_fail.cold+0xa/0x14 [ 794.593874][T23429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 794.620234][T23429] ? ___might_sleep+0x1e7/0x310 [ 794.620252][T23429] ? arch_local_save_flags+0x50/0x50 [ 794.620270][T23429] ? vprintk_default+0x28/0x30 [ 794.620290][T23429] ? vprintk_func+0x86/0x189 [ 794.630408][T23429] __should_failslab+0x121/0x190 [ 794.630430][T23429] should_failslab+0x9/0x14 [ 794.630449][T23429] kmem_cache_alloc_trace+0x2d1/0x760 [ 794.630477][T23429] kobject_uevent_env+0x2fb/0x102b [ 794.639788][T23429] ? down_read+0x120/0x120 [ 794.639818][T23429] kobject_uevent+0x20/0x26 [ 794.639835][T23429] __loop_clr_fd+0x4ee/0xc90 [ 794.639855][T23429] lo_ioctl+0x44a/0x23e0 [ 794.649263][T23429] ? add_lock_to_list.isra.0+0x450/0x450 [ 794.649281][T23429] ? rcu_softirq_qs+0x20/0x20 [ 794.649301][T23429] ? lo_rw_aio+0x1e50/0x1e50 [ 794.649319][T23429] ? __fget+0x473/0x710 [ 794.649335][T23429] ? lo_rw_aio+0x1e50/0x1e50 [ 794.649365][T23429] blkdev_ioctl+0x10e0/0x2120 [ 794.659808][T23429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.659839][T23429] ? blkpg_ioctl+0xc10/0xc10 [ 794.659855][T23429] ? lock_downgrade+0xc40/0xc40 [ 794.659870][T23429] ? kasan_check_read+0x11/0x20 [ 794.659890][T23429] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 794.668771][T23429] ? rcu_read_unlock_special+0x380/0x380 [ 794.668813][T23429] ? __fget+0x49a/0x710 [ 794.668858][T23429] block_ioctl+0xee/0x130 [ 794.677671][T23429] ? blkdev_fallocate+0x410/0x410 [ 794.677688][T23429] do_vfs_ioctl+0x107b/0x17d0 [ 794.677710][T23429] ? ioctl_preallocate+0x2f0/0x2f0 [ 794.677730][T23429] ? __fget_light+0x2db/0x420 [ 794.688079][T23429] ? fget_raw+0x20/0x20 [ 794.688092][T23429] ? ksys_mount+0x100/0x150 [ 794.688113][T23429] ? do_syscall_64+0x8c/0x800 [ 794.688155][T23429] ? do_syscall_64+0x8c/0x800 [ 794.696865][T23429] ? lockdep_hardirqs_on+0x418/0x5d0 [ 794.696885][T23429] ? security_file_ioctl+0x93/0xc0 [ 794.696904][T23429] ksys_ioctl+0xab/0xd0 [ 794.696924][T23429] __x64_sys_ioctl+0x73/0xb0 [ 794.706156][T23429] do_syscall_64+0x1a3/0x800 [ 794.706177][T23429] ? syscall_return_slowpath+0x5f0/0x5f0 [ 794.706196][T23429] ? prepare_exit_to_usermode+0x232/0x3b0 [ 794.706218][T23429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 794.706243][T23429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.717076][T23429] RIP: 0033:0x457f07 [ 794.717092][T23429] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 794.717100][T23429] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 794.717137][T23429] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 0000000000457f07 [ 794.717162][T23429] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 794.717170][T23429] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 794.717200][T23429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 794.726881][T23429] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:19:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:01 executing program 5 (fault-call:2 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:01 executing program 4: syz_open_dev$media(0x0, 0xadc5, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xf000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 795.219438][T23453] FAULT_INJECTION: forcing a failure. [ 795.219438][T23453] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 795.232666][T23453] CPU: 1 PID: 23453 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 795.241694][T23453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.245206][T23456] IPVS: ftp: loaded support on port[0] = 21 [ 795.252503][T23453] Call Trace: [ 795.252532][T23453] dump_stack+0x1db/0x2d0 [ 795.252570][T23453] ? dump_stack_print_info.cold+0x20/0x20 [ 795.252604][T23453] should_fail.cold+0xa/0x14 [ 795.252638][T23453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 795.282240][T23453] ? lock_downgrade+0xc40/0xc40 [ 795.287084][T23453] ? kasan_check_read+0x11/0x20 [ 795.291938][T23453] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 795.297915][T23453] ? rcu_read_unlock_special+0x380/0x380 [ 795.303542][T23453] ? rcu_softirq_qs+0x20/0x20 [ 795.308236][T23453] should_fail_alloc_page+0x50/0x60 [ 795.313460][T23453] __alloc_pages_nodemask+0x323/0xdc0 [ 795.318823][T23453] ? kernel_text_address+0x73/0xf0 [ 795.323938][T23453] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 795.329655][T23453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 795.335906][T23453] ? ___might_sleep+0x1e7/0x310 [ 795.340769][T23453] ? trace_hardirqs_off+0xb8/0x310 [ 795.345877][T23453] cache_grow_begin+0x9c/0x8c0 [ 795.350636][T23453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 795.356880][T23453] ? check_preemption_disabled+0x48/0x290 [ 795.362616][T23453] kmem_cache_alloc+0x645/0x710 [ 795.367462][T23453] ? cache_grow_end+0xa4/0x190 [ 795.372227][T23453] getname_flags+0xd6/0x5b0 [ 795.376745][T23453] user_path_at_empty+0x2f/0x50 [ 795.381593][T23453] do_mount+0x168/0x2fa0 [ 795.385837][T23453] ? copy_mount_string+0x40/0x40 [ 795.390771][T23453] ? rcu_read_lock_sched_held+0x110/0x130 [ 795.396489][T23453] ? kmem_cache_alloc_trace+0x354/0x760 [ 795.402040][T23453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 795.408273][T23453] ? copy_mount_options+0x30e/0x440 [ 795.413474][T23453] ksys_mount+0xdb/0x150 [ 795.417712][T23453] __x64_sys_mount+0xbe/0x150 [ 795.422400][T23453] do_syscall_64+0x1a3/0x800 [ 795.427043][T23453] ? syscall_return_slowpath+0x5f0/0x5f0 [ 795.432707][T23453] ? prepare_exit_to_usermode+0x232/0x3b0 [ 795.438442][T23453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 795.443992][T23453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.449879][T23453] RIP: 0033:0x45ab0a [ 795.453772][T23453] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 795.473386][T23453] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 795.481806][T23453] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 000000000045ab0a [ 795.489773][T23453] RDX: 00007f93e78f8ad0 RSI: 00000000200002c0 RDI: 00007f93e78f8af0 [ 795.497735][T23453] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 795.505700][T23453] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 14:19:01 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) accept4$unix(r0, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40400, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYBLOB='\x00\a\x00'], 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000300)={r5, 0x2}) [ 795.513665][T23453] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:19:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:01 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="7fb19ddd375f69d983f9b2c1dc7492890ef4d26ad28a776b6345a1a15782b70d0ffd8147af22974ec4549f2eb5dae17e462adbdd1effd6f943579ef44d5447a533b083da217e9d306451abeb67db8013b1b1dc311cb9f74e4672f85230a0ff999c9217d3353e29a96d7ad79fba0823272763824648b33adba5e444da1d4b1bbd5c4316e50da5b49dd33f6371e19056", 0x8f, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) r5 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x40, 0x1a1001) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) r7 = msgget$private(0x0, 0x130) msgctl$IPC_RMID(r7, 0x0) r8 = accept(r2, &(0x7f00000001c0)=@caif=@dbg, &(0x7f0000000080)=0x80) connect$llc(r8, &(0x7f0000000240)={0x1a, 0x327, 0x6, 0xfffffffffffffffd, 0x3, 0x156e8000000, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 795.705149][T23465] IPVS: ftp: loaded support on port[0] = 21 [ 795.705944][T23468] IPVS: ftp: loaded support on port[0] = 21 [ 795.734197][T23461] IPVS: ftp: loaded support on port[0] = 21 14:19:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:02 executing program 5 (fault-call:2 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x14000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:02 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) [ 796.061712][T23478] FAULT_INJECTION: forcing a failure. [ 796.061712][T23478] name failslab, interval 1, probability 0, space 0, times 0 [ 796.073544][T23465] IPVS: ftp: loaded support on port[0] = 21 [ 796.094191][T23478] CPU: 0 PID: 23478 Comm: syz-executor5 Not tainted 5.0.0-rc3-next-20190122 #17 [ 796.103292][T23478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.103300][T23478] Call Trace: [ 796.103327][T23478] dump_stack+0x1db/0x2d0 [ 796.103352][T23478] ? dump_stack_print_info.cold+0x20/0x20 [ 796.126708][T23478] should_fail.cold+0xa/0x14 [ 796.131318][T23478] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 796.137197][T23478] ? ___might_sleep+0x1e7/0x310 [ 796.142050][T23478] ? arch_local_save_flags+0x50/0x50 [ 796.142069][T23478] ? vprintk_default+0x28/0x30 [ 796.142086][T23478] ? vprintk_func+0x86/0x189 [ 796.142107][T23478] __should_failslab+0x121/0x190 [ 796.142127][T23478] should_failslab+0x9/0x14 [ 796.142143][T23478] kmem_cache_alloc_trace+0x2d1/0x760 [ 796.142172][T23478] kobject_uevent_env+0x2fb/0x102b [ 796.142193][T23478] ? down_read+0x120/0x120 [ 796.156784][T23478] kobject_uevent+0x20/0x26 [ 796.171541][T23478] __loop_clr_fd+0x4ee/0xc90 [ 796.171563][T23478] lo_ioctl+0x44a/0x23e0 [ 796.171579][T23478] ? add_lock_to_list.isra.0+0x450/0x450 [ 796.171596][T23478] ? rcu_softirq_qs+0x20/0x20 [ 796.171623][T23478] ? lo_rw_aio+0x1e50/0x1e50 [ 796.171644][T23478] ? __fget+0x473/0x710 [ 796.171661][T23478] ? lo_rw_aio+0x1e50/0x1e50 [ 796.171690][T23478] blkdev_ioctl+0x10e0/0x2120 [ 796.194450][T23478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.194466][T23478] ? blkpg_ioctl+0xc10/0xc10 [ 796.194483][T23478] ? lock_downgrade+0xc40/0xc40 [ 796.194505][T23478] ? kasan_check_read+0x11/0x20 [ 796.204801][T23478] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 796.222744][T23478] ? rcu_read_unlock_special+0x380/0x380 [ 796.222770][T23478] ? __fget+0x49a/0x710 [ 796.222794][T23478] block_ioctl+0xee/0x130 [ 796.222810][T23478] ? blkdev_fallocate+0x410/0x410 [ 796.222826][T23478] do_vfs_ioctl+0x107b/0x17d0 [ 796.222847][T23478] ? ioctl_preallocate+0x2f0/0x2f0 [ 796.222867][T23478] ? __fget_light+0x2db/0x420 [ 796.238510][T23478] ? fget_raw+0x20/0x20 [ 796.238524][T23478] ? ksys_mount+0x100/0x150 [ 796.238546][T23478] ? do_syscall_64+0x8c/0x800 [ 796.238566][T23478] ? do_syscall_64+0x8c/0x800 [ 796.259138][T23478] ? lockdep_hardirqs_on+0x418/0x5d0 [ 796.278231][T23478] ? security_file_ioctl+0x93/0xc0 [ 796.278290][T23478] ksys_ioctl+0xab/0xd0 [ 796.300911][T23478] __x64_sys_ioctl+0x73/0xb0 [ 796.300935][T23478] do_syscall_64+0x1a3/0x800 [ 796.300958][T23478] ? syscall_return_slowpath+0x5f0/0x5f0 [ 796.330321][T23478] ? prepare_exit_to_usermode+0x232/0x3b0 [ 796.330345][T23478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 796.330386][T23478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.347486][T23478] RIP: 0033:0x457f07 [ 796.351389][T23478] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 796.351398][T23478] RSP: 002b:00007f93e78f8a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 796.351413][T23478] RAX: ffffffffffffffda RBX: 00007f93e78f8b30 RCX: 0000000000457f07 [ 796.351422][T23478] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 796.351432][T23478] RBP: 00000000200002c0 R08: 00007f93e78f8b30 R09: 00007f93e78f8ad0 [ 796.351440][T23478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 796.351465][T23478] R13: 0000000000000000 R14: 00000000004dbc50 R15: 0000000000000004 14:19:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x18100000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 796.986004][T23487] IPVS: ftp: loaded support on port[0] = 21 14:19:05 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpgid(0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4440, 0x0) fgetxattr(r2, &(0x7f00000001c0)=@random={'system.', '\x00'}, &(0x7f0000000200)=""/73, 0x49) getpgid(r1) unshare(0x40000000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) bind$netrom(r0, &(0x7f0000000040)={{0x3, @bcast, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) recvmmsg(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) close(r3) pause() setns(r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x9, 0x80, 0x0, 0x2, 0x5, 0x2, 0x9, 0x9, 0x6, 0xad, 0x400, 0x7, 0x1, 0x1c000000, 0x8, 0x11}}) 14:19:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 799.369333][T23501] IPVS: ftp: loaded support on port[0] = 21 14:19:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='v.at.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:06 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:19:06 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:19:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x20000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 799.979947][T23511] IPVS: ftp: loaded support on port[0] = 21 14:19:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x376f0900}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:06 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = dup(r1) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:19:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x0, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 800.150672][T23523] IPVS: ftp: loaded support on port[0] = 21 [ 800.170596][T23501] IPVS: ftp: loaded support on port[0] = 21 14:19:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='v/at.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:06 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 800.394425][T23536] IPVS: ftp: loaded support on port[0] = 21 [ 800.521079][T23523] IPVS: ftp: loaded support on port[0] = 21 14:19:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vf%t.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:09 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r3, 0x4, 0x3ee6, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x401}}, ["", "", ""]}, 0x24}}, 0x4) recvmmsg(r1, &(0x7f0000003e40), 0x10c, 0xfffffffffffffffc, 0x0) close(r0) pause() r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f00000000c0)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xe2, @empty, 0x101}, {0xa, 0x4e22, 0xffffffffffffc79d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, r6, 0x100}}, 0x48) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000340)=0xf4) socketpair$unix(0x1, 0x8000000, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 14:19:09 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000040)={0x1, 0x0, 0x29}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x0, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 803.647829][T23555] IPVS: ftp: loaded support on port[0] = 21 14:19:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 803.734064][T23561] IPVS: ftp: loaded support on port[0] = 21 14:19:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 804.037808][T23561] IPVS: ftp: loaded support on port[0] = 21 14:19:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfa%.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:10 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:19:10 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:19:10 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f00000000c0)={0x5, 0xf900000000000000, 0xbba3, 0x401, 0x8, 0xcc78c0f}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x71f33368, 0x4) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000080)='%:em1\x00') pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x3, 0x1, 0x1ff, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, 0xffffffff, 0x10000, 0x4, 0x4, 0xc20000000000, 0x1, 0x1f, 0xb3d9c80, 0xc8, 0x8001, 0x0, 0x7, 0xa6, 0xac5e, 0x0, 0xb1, 0xffffffffffffff7f, 0x7fff, 0x2, 0x9e4, 0x0, 0x8, 0x80000001, 0x0, 0x7, 0x1, 0x2, 0x0, 0x3, 0x2, @perf_config_ext={0x3, 0xf7}, 0x80, 0x1, 0x81, 0x7, 0x7fff, 0x2b5, 0x8000}, 0xffffffffffffffff, 0x5, r0, 0x0) [ 804.333688][T23579] IPVS: ftp: loaded support on port[0] = 21 [ 804.337815][T23583] IPVS: ftp: loaded support on port[0] = 21 14:19:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5e000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 804.383852][T23588] IPVS: ftp: loaded support on port[0] = 21 14:19:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x0, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfa\x84.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x61000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x63000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 804.709958][T23588] IPVS: ftp: loaded support on port[0] = 21 [ 804.731963][T23591] IPVS: ftp: loaded support on port[0] = 21 14:19:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x68000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat/', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:19:11 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 805.039802][T23623] IPVS: ftp: loaded support on port[0] = 21 14:19:11 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 805.238877][T23634] IPVS: ftp: loaded support on port[0] = 21 14:19:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x71000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) 14:19:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:14 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000040)={0x1, {0x0, 0x989680}, 0x5, 0x4}) 14:19:14 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 808.463511][T23642] IPVS: ftp: loaded support on port[0] = 21 14:19:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x73000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 808.539583][T23653] IPVS: ftp: loaded support on port[0] = 21 14:19:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) 14:19:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:14 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x7, 0x4) close(r1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x3, "1afb28866aa068d6"}) pause() ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000000)={0x0, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e22, 0xffffffffffffff23, @mcast2, 0x6}, {0xa, 0x4e23, 0x6, @rand_addr="eec72580c32f83cba22dc8322070408a", 0x10000}, 0x0, [0x7f, 0x1ea, 0x7, 0x1000, 0xab83, 0xfffffffffffffffd, 0x80, 0x1]}, 0x5c) 14:19:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 14:19:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 808.891007][T23670] IPVS: ftp: loaded support on port[0] = 21 14:19:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) 14:19:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x908a0a00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:15 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:18 executing program 3: unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r2, r3, r4) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18541, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r6, 0xc010641d, &(0x7f0000000080)={0x0, &(0x7f0000000100)=""/244}) 14:19:18 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:18 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:19:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9cffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) 14:19:18 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 811.941031][T23699] IPVS: ftp: loaded support on port[0] = 21 [ 811.958010][T23700] IPVS: ftp: loaded support on port[0] = 21 14:19:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9fffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 812.027860][T23710] IPVS: ftp: loaded support on port[0] = 21 14:19:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) 14:19:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa8000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) 14:19:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 812.797013][T23710] IPVS: ftp: loaded support on port[0] = 21 14:19:19 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 813.049727][T23740] IPVS: ftp: loaded support on port[0] = 21 [ 813.315045][T23740] IPVS: ftp: loaded support on port[0] = 21 14:19:21 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x7, 0xfffffffffffffffd, 0xfffffffffffffffa, 0xa88, 0x4, 0xffffffffffff7fff, 0x7fff, 0xddbe, 0x80000001, 0x6, 0xffffffffffff8000, 0xffff, 0xd46}, {0xa51, 0x5, 0x10000, 0xfffffffffffffc00, 0x0, 0x7fffffff, 0xdc89, 0x7, 0x5, 0x3, 0x7, 0xd6d9, 0x400}, {0x5, 0x80000000, 0x622, 0x61, 0x80000000, 0xd6, 0x8, 0xca, 0xfffffffffffff0ef, 0x3800000, 0x99, 0x7, 0x6}], 0xffffffffffffffe0}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000002c0)={0x6, @win={{0x100, 0xcf6, 0x7, 0x1f}, 0xf, 0x2, &(0x7f0000000180)={{0x8, 0x5, 0x0, 0x6}, &(0x7f0000000140)={{0x12, 0x9, 0x9, 0x3}, &(0x7f0000000100)={{0xffff, 0x6, 0x8, 0x100000001}}}}, 0x9, &(0x7f00000001c0)="91c945bbaeaf5cbd07eb83f478765ed21db9e8b4c6f1367a287c2246440b7180a6360c991d0a5d4381d26aca2b9aa51afab02f8266dafeb7ec1cf43fadde7271541a5413bd8672c8a6a4d33fd66f4f032733ce4a1fdd2dd2a50456171b6677aa9937ddc2805ae7a27afd7568ac3949ba7e890dc9b4f5c21d30a6346ab299fa664c9dfd85561685dfa4b48a8352a22a7c675580c44d8ea83b0a7689a5760a77da42e83cb144482a0ce9c9ee15ea8759f19739f8036fb606337d1a37ee0b84dccec868e3ad3c0cc3f55aa47738e20604dcd67ec632aec5cfc1653cc292dcd239a793f6db", 0x5}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fadvise64(r1, 0x0, 0x200, 0x3) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000000)={0x0, 0x0, {0x10001, 0x6, 0x2023, 0xf, 0xd, 0x0, 0xffffffffffffffff, 0x7}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r1) 14:19:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 14:19:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff0f0000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:21 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:19:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:21 executing program 3: clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = shmget(0x2, 0x5000, 0x0, &(0x7f0000ffb000/0x5000)=nil) shmctl$IPC_RMID(r2, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x200, 0x10100) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8200, 0x0) write$P9_RREAD(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xe7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x9) [ 815.762982][T23754] IPVS: ftp: loaded support on port[0] = 21 [ 815.788874][T23751] IPVS: ftp: loaded support on port[0] = 21 14:19:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 815.855340][T23760] IPVS: ftp: loaded support on port[0] = 21 14:19:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, 0x0) 14:19:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffff85}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, 0x0) 14:19:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 816.558765][T23754] IPVS: ftp: loaded support on port[0] = 21 14:19:24 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x6, 0x0, [], [{0x59, 0x1000, 0x5a29, 0x781, 0x6, 0x6}, {0x8, 0x80, 0x6, 0x2, 0x9, 0x3}], [[], [], [], [], [], []]}) lsetxattr$security_selinux(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:crypt_device_t:s0\x00', 0x24, 0x3) r1 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r2) open(&(0x7f0000000780)='./file0\x00', 0x90180, 0x12) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000007c0)=0x0) syz_open_procfs(r4, &(0x7f0000000800)='net/udplite\x00') readv(r0, &(0x7f0000000740)=[{&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/229, 0xe5}, {&(0x7f0000000440)=""/156, 0x9c}], 0x3) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) 14:19:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffe4}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:24 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:19:24 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:24 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0xa24071e5199b5514, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x20000) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000040)) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:19:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 818.815004][T23800] IPVS: ftp: loaded support on port[0] = 21 [ 818.826952][T23804] IPVS: ftp: loaded support on port[0] = 21 [ 818.837270][T23798] IPVS: ftp: loaded support on port[0] = 21 14:19:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, 0x0) 14:19:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, 0x0) 14:19:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 819.594726][T23798] IPVS: ftp: loaded support on port[0] = 21 14:19:28 executing program 4: r0 = syz_open_dev$media(0x0, 0x6b8, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) 14:19:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 14:19:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:28 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:28 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:28 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getpeername$ax25(r2, &(0x7f0000000040)={{0x3, @netrom}, [@rose, @null, @remote, @bcast, @bcast, @null, @rose, @netrom]}, &(0x7f0000000100)=0x48) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x10001}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000001c0)={r3, 0x2000000000000000}, 0x8) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:19:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 822.099539][T23844] IPVS: ftp: loaded support on port[0] = 21 [ 822.104174][T23839] IPVS: ftp: loaded support on port[0] = 21 [ 822.184188][T23850] IPVS: ftp: loaded support on port[0] = 21 14:19:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 14:19:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 14:19:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 822.872181][T23839] IPVS: ftp: loaded support on port[0] = 21 14:19:31 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102081ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 14:19:31 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:31 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000080)={r1, 0x1}) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000006) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x186}}], 0x1, 0x0, 0x0) close(r2) pause() socketpair$unix(0x1, 0x20000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:19:31 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) restart_syscall() pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:19:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 825.273738][T23889] IPVS: ftp: loaded support on port[0] = 21 [ 825.330088][T23895] IPVS: ftp: loaded support on port[0] = 21 14:19:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xf19, 0x0, 0x0, 0x0, 0x0) 14:19:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 825.429626][T23905] IPVS: ftp: loaded support on port[0] = 21 14:19:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 825.696742][T23905] IPVS: ftp: loaded support on port[0] = 21 14:19:34 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa00, 0x0) pause() openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x109000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) 14:19:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:34 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x7ff}}, 0x10) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000004c0)=0xe8) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000001540)={r4, @local, @broadcast}, 0xc) timer_create(0x1, &(0x7f00000002c0)={0x0, 0x3, 0x4, @thr={&(0x7f0000000140)="8fe2ca77fa3b2f6ea20f116a6016276161b02306e315d163ae02cbbaa39e39533694b8791ba4dd2c9526e5e18656490ee6d5f870dacf999c23126b69f89dd7531650c14f3fb8ce578a0be1a5d28311", &(0x7f00000001c0)="6f51538960623d8359a98d6defff68b91f1df4aed32a79dbc94f518a42e1cbe2b35f1f533ff4bfe88cd2db90316d3708f7763db15fb5a96c4e7b310299884b0e57edd221ab3d9044b9b6fba7edfe4979575a3b63203c6383bf827edb7183e08152ba82b55b82c5ab35f35a03bc82c19379fd7e600be259d179edb9f1affe0c67b19e192eb372ff1917e582ba9e9be31710250c4976ed2c8d61d8305b3b75d5f2db57b2abe356de6f5eba16fd31598c3f2e2f9f58b427bf974fdc7895d348231c560fe660ca509e6ca787c5bed7849cb0903d42f79682bc2bdf1debad7251"}}, &(0x7f0000000300)=0x0) timer_getoverrun(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:19:34 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 828.392097][T23931] IPVS: ftp: loaded support on port[0] = 21 [ 828.399427][T23930] IPVS: ftp: loaded support on port[0] = 21 14:19:34 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000440)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) lstat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001b80)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001bc0)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001cc0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001d00)={0x0, 0x0, 0x0}, &(0x7f0000001d40)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001d80)=0x0) stat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000042c0)={0x0}, &(0x7f0000004300)=0xc) r11 = geteuid() getgroups(0x3, &(0x7f0000004340)=[0xee00, 0xee01, 0xffffffffffffffff]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004380)=0x0) getresuid(&(0x7f00000043c0), &(0x7f0000004400)=0x0, &(0x7f0000004440)) getgroups(0x6, &(0x7f0000004480)=[0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0x0, 0x0]) r16 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000044c0)='/dev/video37\x00', 0x2, 0x0) r17 = gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000049c0)={0x0, 0x0}, &(0x7f0000004a00)=0xc) r19 = getegid() r20 = getpid() fstat(r0, &(0x7f0000004a40)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = getgid() r23 = getpgid(0xffffffffffffffff) fstat(r0, &(0x7f0000004ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000004b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = gettid() stat(&(0x7f0000004bc0)='./file0\x00', &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000004c80)='./file0\x00', &(0x7f0000004cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getown(r0, 0x9) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) getegid() r29 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000006600), &(0x7f0000006640)=0x0, &(0x7f0000006680)) r31 = getgid() sendmmsg$unix(r0, &(0x7f0000006d80)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)="9e4bafc3f83bbc5fafdd333b72571b72e3c9e874c9a5bdfebf2c66c4d9", 0x1d}, {&(0x7f0000000100)="91205b1651ecfc5a20b500ead0a88f7abec853e3e7092362300817f228cccb72bd5795071eaa211d84ae1a2daab17cebcff1c6f51d1eee6272b39eeda3532b947096bc61137fd1eddefa7be6b0732cf080952b451c14864e393b5ae3365186248f3352982988574c93509b7e8a12657f21b935bf0d3eef2dde55d6fc7166430420ad8d18cbcf261421dce8e95984791f48eb8e1bf4db79f09bf28fa34a2e1f28e2ea5e4e428fb090954efe7782ba", 0xae}, {&(0x7f00000001c0)="0e52f784db84e66025444b3d0e91ee1265e71e492d719861973b712c950d9707e0192fbd424b97d30f3fd33c09c76cfabec0fe25797269a5d1efa8a3b5dbc9579056051713b0fe15530a0aa59261e00b2c89fc43b970b6aa7b59ce25b1d6753ad13e9c3c220226655cc36007958862f5a5470c40800788eb4dd19a110e5e7e0377f28d42abef3425247c574e6b64c36c68bcb5c6fee9db1b5719428938903832ff76e0b6cacc4617597c214df863a925864e62c37aef7749c5ec7d1571311a393c6a5a3e49979dba87b1917decd38e912213367dc87c381933fec3db67d854696b3b2e4504249d3d6563dfaef4844afdff5f6897", 0xf4}, {&(0x7f0000000540)="d574b106e78681a13631eadbbcc635eb418c7e1e45c8e3c994fd155d699682ebb1d8baddc6d94b91401e6dc1eab9d8169e45ece314ce17c6775e053244721cab49a420c65e6f104213df4b32759b71d0f9d1e46838c99b54a82288ec91db729ca117085996fb94376468b57ea225f12bdaf87e331b1753dcb475c0b89969df9c45e80f3094431350e9367efe3ec7962934b8750a9dd62cfdcab23aebc9fe0a9e12595feeae69dd478d55dd855a83fca808811cf3577be622598e15c8ccb225ecfc17434dcadc7321717969356be7dd1f7f60b8144ae1e3ee71ce43890560661b4cd5b45b42fad7a37f581731546c2beeebb821a11606fb49eb25cc4fae16f10398b94b1352dae504df28447b7d1d1ac44b2f58e8576daa11d588c914631412c83bdd0b0830ab480483cabc229b58c4614187d42b4309dd6c3fce37389110cefaf2872e46678ded60b1067afa0dbe63b79dd9486af57e97f32d722e8ec2262b061ef74867224c988f63fa1a0cc815c2d2c2e663466727eaa69c4c87feab13be53c21569aac829ae5bbdcea57dfbe501b3ab84bb4c395bb00e0fa935a478b1303bfa246018c078a0838e20b851ff79fd1ff21c6305801049e9741651203ecb3aa724625041a42ef021f3972a51eaced98a49bf784be3523e69c6b985aab67370c86d50faca23a85fe765645c8634f4948c40c82d03c6a7be440c3b0ddd303e47464605faaad9a63f2e48610582197a5d095c14da990cb6840a8a2e8a08f66c95638a38ac6e5a8888e44d40e3085dfab2cd50ec6f89f40439da2697003aeb1890de943f4ab0931c5d47d77bfc7d3cb5ae0c5f5666dc3aebd7ea60116e11c699ce382c4fdf2ff17720cd24174dea55f7116d939c168e2f05162d8d795883a34b0174ab7cc3291fb3b92ac50a0e72b8842a5d98aff87d79e0ef26b9c301e9f017904b58cc4b1abb4a9ec3ed5bdcab3fe9812a0cdf8c98e25bcd48a6160c4a2d72169e37fb76f9001547ae522995f3462ff6159fa3956c59f70ba596b350c4bbca6b1e7258f00c8ef7a3289f45b7c4714c9ca481e25b97a04fa6299aa05025843e93a7e5a0b7db6da4ef4c99e9c168612de750c863f85225c0c899bc5e29d2353e6659209f61a4767fd7f684f364f6efd48c15c4434cf6503e77fab291c9e868c416fea30547b183cba7b9323ec855a617067c96b5e161b78f65486da3caaa942eb846c5ab6ab9b720f0b713a48ceb2fe05d1a688538369c9c88f556ee2bb0ff67c04c4a9ea44639780a99f74a9bf4db68ac42fc80a80732fc1ff8f8fc439f83877e1de5c6f5600b6640a02c34bd0fa853cf2e24a0374199533dcb351be99ed16bf0a0225546afe57aeb3043c023d460f044d8849a41de21eabbe4fbda2741070583b92a084d5d950852c8733c314ca9bc7e17a32ea429683e05b3d2d4e92f75a28897c8e2fa1b1040d3344a53f2509f815d85c449a538ecb78e6362ea0aff349cd40cb319a49c8016e2bc31e6b014a10ec9af1998eb44f7b4e89eb0099e1a6a5f9cf965be0d6f9faf26dd5f0e17fdddfd5056c7d0080e59420fb3f5401cf893ee5d4d829160bb08f7bdaeaa7326e424f137155aa045766f3c2b7ae59dac8357c543e85214f392bf2580d63639f689abb1351039b927994b73523130f784870c6c46418247303c249044f773f4797f553193de734ca3304ce351a1b29b4583a8768bfb7e03cf28b8b92062e382063f96e2d9833d38e376b4fba879aa9b43c71f6164ef5548c36091da1481ee094ce0c531631b682386c63e842e0c8b742621633907d6e3ee4960740602f20eae7f2919f7cc9576557bdc77dd89794a569d20c2b52095813a43a54d3366e08df8de512f2ab173af4885fe948bbb797081aa6cdf0c2c3b0809a5793c9bdd88e367ce0f6707041edbc156aebf45d9c07eb0349c3c71a536f67fac75b3488ea99db6a97d257a3f26b07ae4867cd090790cd3455b238b4b58b5bc45bbf64732af6e49949c57e4da072c9f0b43d0361f3268ff225f4dc1b0d815816bab64f22c856ff84d2b9e13e9ddf763a8e7cb89d9b19a3e9f0eae0d77598add055a503c9a64453f8675640691f380b6396cc440af77500f3306a6562f2322e27f1deebf95a0c345901f2fcca36170fe4ff65db1d20d7d31a9d067434e48e25e84912d7e255b404983ce7533682b761a2fe2b3b1d2370ef84d51940a98eeeabd046057630ecd396e2bfe11078ea52fc2186490091861bbb539e556b3e4dc7cfda61a06e7542eb5a1cd53285d24cf6aac330eb8414eaf5dcd9744b1ef9ecc00d6dd66ee927923147100d31e9af6697f9bb7982d41acf193a7b6dd1af987f23f5517649c5e8dc15fbde7e66aec3b65f0a0013c70dfe5e3b90c63fefcf4dd40c6390fabf3f6147f417ffdff5d9e1877a91d90c5ed74a521c58bf1e019fc616b6e581fb0de88388324c122c4ffe523d2f9cf5475967cb68002f2c2de3ba8efe4087449f8914416e5b14798deb7dc6669dd4a7bca9040f0c59847cd9d8b750e25a8a03a7386a1a84602f7b1fe02fa21c294858ed0747f20d7f786cc2c45012ee62e4543e79bd414b5ba1537e3346d8ed527ce33b95c00dcb8687c354b5f75f7e4edf223aa3fa58a076b0895fe17bace4dff02c4e49f35f4e0a3dbc3318d303307beb30ca815ba345c5dddf7b13b7e8415217bb35543780bc47ab291c2893f2f77a3c24105cc932239e971f8e607cb6d363bc453acf058d7fd430929c7f39727436f96193dd84d68c94a871cca050012b8011ce7cff1ccb7922f751c3a7003d40ef75593430e7c1d42d86e09165b582211e552df9b816f014556691d454f4b3dd88e3e8b4abcc92b25c9968f19c215b01b8414b81a2fb1777ee5d3a7e6a067b47bea49f5dfbcbdc55fbee5726cb074530589508805fd5f524384a1055f0c7a54ac9f9adfdf0c0fe365167efc3032d6f4af9c68b207284a4b64c4ed1cde3a6391b0b7a6eb2278f1a09ffef99b641802d667e23de9805b12b2073814d8fc426502b0ab8494f163c490342926a93964f55caa22ee96c059e7f24354ab2e8cbbd36d6ed226db0ab851454432a5b0a2ca18e45e3abc26d20ee4f4ddee23574f99eba8ea33e1df5a9344868c9f115d5124186692f0a2a4d17e26fcc597e2cbcebaa4cc128fde83d6616bf0cc032f493bd4676c53aaaeeec085ba6db1ea8e4b2310e24a6167fdb77cf90e3060023e5087318ab02e78907bfb2aa2ace4312d958b0da055765593c0ab104330b9fee2d30584b8df5e997b0fe35462de8beab0c68c6812e0c15ea800678d35e27704a66605452f4c4e7cf30f765bc38fe658d95c37d821bafd24e661434c3f30fcac5dccd3baa0cd6ffb32717c6268b739e7cb9627da26287f071db06f220358b5ffea12daf7642797353a540971839c87bbf552ee3a93db8bf065d631946d9dac598c8e62fa49a8943c06df370b9409aec168f10f18c1fcd2515d66667798eb5fe684216e0a6739a8edf7c67f8f882429676342ea8258202546fd4ab98cb3835aa28f93074c3eb9ee8e4233c64f6d306a7e94f2d37a03df1016ecb3ba54a8f45723e37553ef7d188626bba9a8d4d00c736a2b05441f59ce1fc592cd5449926bf76c4ef89a8b205857933c62b178c8d65f2f1b1d440858c7d6b32dbf1d5f72a5b7faf4c621e48b23c5143d4382d68e7a39e121ecb5508308db8c073ecc4087e8587de7f21f4d883c3f11dc0091f5c4be15cf53436d3b6f1cb7b9f0122d3928c8751f5a38479c2d2cb2cf9022adcf7546dc57044a1e544b10c7311519611854e9b306b72685c52e4378f4a26dfe7cdfd2619a756ac9c68cfa603b28285729ac3407a75dcc0912ef28df0f3addc1782aa02474be8064d40d18e42c81e92a4420bc4e50119ca7dfde024213dcbda4a17ef6d805d11b4fdab9ad8c146a4dec1894b262102f37bceb5f6219cd3dbec29f4986e37a7a330e3f97674c6806153ded5b5dab84c77d295c85ebbec26a644c7a455703da371cb23e5833e7361613c41d6894d98f7856f1ac74ac7285a1ee44d8cd238f454517d7042fed8bc3ccba3d9007ef7d7731a91d4000b2806b0803686eec6b1a86127300bfa3ff91d2d18711d5267dbdf8a358c7261acdb633c8d4669018b4b326e5e6a0597cef8a5ad0f7b0e3b2ec4b83bd0a8f4ea1998cbb418c7524a73b428c63efffa6802c675e55e6b93daddc7ebe6648246993fbf592aca48bc0e0e51cd33e84a72f3b6e30fcbfaa00c5d0e09f0f869978c8fca44e1e808a5aaee0a87744a300d63bbb6af2a8e90e51123e2a4f6494331598834eea93f4a25881214373cb013f507de831b47733a3365a8ba96c679ce93d76783f54432e85a4c51285c50fc7b200827cab31bb0c24f000fe9ffa926e3e69f1f847c12a6add63314dd3136e814cd1f58b85c25e395c42edcd244773bb9907551db614466d758e0d9d7a5aa97c76c8770e207813395c4cfadae4d7687eadfe2118fa92ce358300daab86acd815e76020edf180e3f2e634d935cfaea7ec07cb2c7d4204c89e52cd3f5eebcd6c6f735a13567c2694f90dccfc0d00b82a7f823c88e3bf3e435fe7db7dfcc2abd201d48393864bb5e6a5d9ddb4885604760b8520d55bed3ec01f6d7a750bac37a459a5edc4d9c3d66338e1a3af9794ae2f6a29c5057e335e9415e88a30e5a0c5c4ce5dfaa192e48913bb4ccb05b529ebd1970b523fa6c840ef55f51b60fab01d2be800bd4a8e5c6cd62c58c9c48260d5d6ab6f91df84bfbe0d78b1c56ff6d6a4cbadbd19239f845c2c7756f5f8e3b0e342a63e373058a552ff1cfbfb8b74b09ec2a6c9d89fbd691e1a5bab62e96b48ff2126a6d24e62cde2e27786d79252ddbe0f8531eb57540031a9e2f9a0696e8515252f0793d5cc5f7622d237be01fdc515f4bfc40bfb190805d182dbe3d42edb62ff168cb45bc5d7e82f97617bb9682886ca9d8042df8875920fcb70bc02fbb9bb4e2ac9fa9e613c7e7eba0c6af5683b7cea5cacde9dc4e6480eb7cf512c625730f5aee8f48e5e657e17efad064bead920111e6acf4631e692b37bcf26380c635e2c0df3c78d9d877635b7470cabebd2fd29553f3a8daed7c4009955bbeb4099bfa4c460c8baefdd7bec618706aa6cfaa479d781aa4c497767a81ccac3049a463b38ffc3559d718a1850ced0d8173b577be581f6bc20620c1c86a252558734e1173aabe44051df12ad4ca0ff70746e3057c6d427284ff99489ef066886d6314c6f2c4dee23e49e162a9b86462bed3c82f3967100fc1f5b8fbeb07e14248b254438d08dc71929b12d4e724610e9804f8885df75df04c37c3eea228ce35c569d409105779ca15bda1b44c793cb4a6788a891d1368beae890e1207065eee59fc416e369f128d85bdfc9aee661850eaf172fc39f6809fc4a0b85f97825bcaa144ba204a0945bf3b3056f29f19a564d22fbb836600091864dd9536d1b0f95fb9401f04808af7614967bec97e46e14cac798783e1849b125a17dc540b4ce04369e3e1a290fa29d872980a70c7c91a7fba9a45f0b0996fa65e881fb9dd39c9ad58e41272813f0d43562e8a3fc727bbeb35037520c003b692fcfae4be8daa56ac3f3d5440703356506ad0eb8a202a0ccd77dacd6181dea6712c269fa42a2f27c3e0f9d20c599d4a93155c4ad8fdaab7aa0993cc406df996666d692cf48aa1da8fa54c94eaaab86472d66905e2062a86475ae335c50163763f3f55b0bc427c13335b9ec9dcec0d8c961b7480704f2a823f0e265d90aa22dfd23f263e49a", 0x1000}, {&(0x7f00000002c0)="5a3d8b7a2fda2c1c65c121f4b491daa175133cd26da120d63a7b29977ff562575948dbb607602afb30e78a57d12828798a63d07edaa5b58d14d97dc4fa4fb3bf402c1ec8", 0x44}, {&(0x7f0000000340)='>', 0x1}, {&(0x7f0000000380)="fcdd3061d54f20", 0x7}], 0x7, &(0x7f0000001600)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}], 0xa0, 0x8000}, {&(0x7f00000016c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001740)="c4e70f18e03f04834d814b1172ca937a671906479091c99361e133322d0101d57a54ffb1c3d9b746e8401ce8a98e1d698421157fd3af9727fb194e27cb2f3aa7faa3899e055a47920c86a64b6ded21723ce03440c1d5e8bc4606b78207ccaf16269eaa97694626d51fb257e141abc5aac610", 0x72}, {&(0x7f00000017c0)="30e0e1000c16417536f71354cdd8e43ec13115966d5f13c0adbfe1f16d873eec14e3c0c9aac836170d194f79b3e7cbcd8de9f3a22bab5bd5c26f585ce168d6f6fd884c09017502ec0cea9bc27cffbfa36d26e9283904f6de98dadac142648cab83aa6055de1340ea153d47b0a84700f566c2ddd0d19112a992fe426c280f408286a5a1e4ecdd064e974b534a1789617b0c0a33f631f1f265c70d75d1d0f1a5124528857eea54e7ab4758d5a18f2cf71bc6f3b2365d53aff0e0", 0xb9}], 0x2, &(0x7f00000018c0)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0x28, 0x40}, {&(0x7f0000001900)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001980)="c07305171db08d4f2899c7abfcbf92017a09ea", 0x13}], 0x1, 0x0, 0x0, 0x800}, {&(0x7f0000001a00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000001a80)="685c75893b008ef971bce0ece7977040206ebea5ebe42a6fa4e40f4832b78d205b942147f666ab7ebf2e60074ecb2cc7ce9d705a07f07f29845615c8f17f4dd83d5c6da030fffbd38bbc94f25cbfaa40bd934fa36220276e301e2096dee94f81a82e674d37e1b590c8a38e87db6b35b827063cb974790ec58a4dfc8d093f3fa1cb2144d2eabe1c0bda15107ec30aad9ec11d3fdc9eb7c3b3766003d45fc51a4651b83daa", 0xffffffffffffffa4}], 0x1, &(0x7f0000001f40)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0xd8, 0x40}, {&(0x7f0000002040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004240)=[{&(0x7f00000020c0)="e96a8fc4c314c7a6010e6868a38cb3ffef35f00a12337e51a43d0a1d171dd31cbf5befc69fff301e9d1965dac50c2d3075c5d33ebfb656ff08859b7574f447155ce1", 0x42}, {&(0x7f0000002140)="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", 0x1000}, {&(0x7f0000003140)="d0cdd177ae93793d2f1660c409a6e99664d19b593ef5ac88a72771c9a698af66d381fac7b4edf1df2d9c07dc8c7fedb3d7b9a9f994515a2cedd69a0ac6a651516b1421a61c8779b78455f6e2506899f576a5e408a92fdf9b2c4f8529d5fe4c95a58e823c2c50dc3222f1aafdcea2488f4846452812972bbead6d1a670e58a8db45ded9f96fef0168e7a0e142828eded6bf1198be1191a0b7f4c40db4717309fb7c91e7945809d09e75a80bd67e6c514db64a235b584db0a46884c360f89ca6630114f1f9cbd1a62c79a36f0521cf0c00bc524567cc3b6111cc634e2d49bd970bbf932eed192795fb9d25b7586eb7c6eb29ed93425cbcb004dcb90f001ec3db8a8eea233aa5d96d8db5a4142c09bb5f78710d155fad066abc5d2b5b33342ca58423e249bd6ebbc2090250f4ae6cb49c2915cef265d8259b689644282c99d479fa69d45a8c308899ebe5af80b818050732d5e55eb4c1ab863cec5db34c28c375898e2c345fa17f46e2d29399d46f50495076c0dc7b1d705ed803c31f177efcfdb62e66f050ce3a49ba474170e87f9b3029807718379200ef8c3b6e8e2bddfbb6f47a50b9397e7eb45f8453571d2b4c2f3a4fbe1414d3636bc38bb32db73f964f05a949f3fa8659c3c935d722145329d8e6fea54eaebddc800489b98486a5935d694f8902c39cda630961db8ea99dbbac967625be63c572247167b3c1626d13b850685d207b71d9a03fab44013911f9c0c7e2b91d15a39de94511b2b942ea50bae18f1a330f9e58453dd25e8a5f3988ae5cf7140defccae7955fbfd5660b01b370a773b8320d17aefdd1fefe070bbd848787e54ac5e5690381dc9ec9c00caeb9ad700a75d0d473be9b6534c22bcf2115ad95b298572554e07ee09445c406d1fb71dd2708790690e4f8b740b9fac976bb0d470d75f84a128673690e24c368ed0ed9b3ea21d34be0cb773e23250df9377f12c995f5963685e1ae1af097d2c1b77e2d4c8d2fa4065b0958eb536b0fb598826974bee720592b2187036503f306cfb051ec5d89ebd9ebe4568a46bfb0715836a1c7ae74714543c9157cd6f8f001da7b628275dba166c95109a1a73893fcfbe606e9a8bb978c9217d09c46fa4f9d5b75dc1dbd3b3e8e649c963e980b8da12f7517734d582ff4bff6912a0218bd31cd1936eef2502271762aa177bb256c417760660f70b7ee0dc817ecb962ef0ff349663d662a28f5237c41eeec1dd18a5bb29630be516060a13b2f746e1ae8056e898967ebca4e7f42e17570a3efef2c9f40a48ccebc5d560b50477e6d09d37398010661aa8ca64900d3b144ce5109b643c9603c2809c56dfe04548a4d0957f78a208017f58cebefbe2ae40ed7449deed7d65c85895a54e17b0c3889952d54d2ef8563e54fe3c3f4040db6c60b2a638bfcb9d258595dd0f30bd8e4a81d63296d902cb78e56d3421c692099c16ab258cbb4d4ce206e73c728d79d8599c4d472bc9d61ec30ab88d8640d28cebb3e1e683f722ae9e5c662a8270c5674d531d6d075d6e6f60a00036991ed9ae09cbee2eca298ec8670994ae88c7993cd412ca3d15c3d8d0c76ebe1886efba7cc12a10976801f8f45e459080b732ef21092fa07a2003f6760bf3251825a56259efc9a46b0db9de97f58d92ca94b4a3a86d5208955ea3e42c14bf086fe5a7dba5e197d6b10df212c888e56e5528ba214658de3981116550d66d0369deaa9e1ac9fb9bf1f352728afce25ca9de411349e99d4a31d1894c0c34839bc81d35b726004ffda4f281e49aa92bae2c5ec0e069a711fd42ffddc78fb9386328b312ce3c75022cb326122a50f4f81244c6978924adeb4c202852a8322f21abd8e17cd73d0f670ed2fe438551fcb60ff92a9318f2eafd21032016f0f328cc633405e8202e0bcff2bf19741de1d88cda87484aee5b6b06d73a7e2fe7d045f18f674fc5f55daad6ee86547de481393e62fa77914f113786859ab4913eb955b6391843689e7bb985f2b0585432fa47ed3fc8a71770a5cc6c8fea303e2a8a7106e4b395f1ac164dbfe8055e5a761aeb8c0ccb8650c1295a7178c6c6b04189759feb87fda7607e403419bb5127cc8fb3e1521970e8be50120fdc4a71493b0a207a9f0190d26f2ba0f3db49249b7e5654016f609e7debbb9ee7209adb2c01f400c3d47890eece1b7ef4f60dde64195d927bb9007f93f2148519d3c2329fb432517351e002c17938659a6095fe15cf0efb87b65026f92d9bc6a9b9e3202d3cdb8f51b44b386bd3f35f4ab0c83cdfe28d18ad62414436a6af788ca52455f276e85abdfa0fa90eddf7f881b2fcc7397c34b34bd8cbdadc3fcdb6462336b11d53034443f7f081b863dcfceb676b1dacb4ec57b11d649ab32e05c90ca260b8b6c3a25ae7ed7661c6f01fae985abeb559cdf3f27b9b933c5c8be8ea5f8a251a213246e15a4b2452750a3eea8481102ec7a935e7bb306b3f309682886fd494dc551d429aa6076b3f164b1740dbb448582b28d3ffae0d699645751798f3fb71a7c880aa6a1409de464658909d35bdd1a8cd3eca7de53229a14b1014745c2d781f44b4f0cb96e597aa1dadbb0f210ac614a529b115ae1c2f21160b63d5b0cc311f4a2204919650d386de1f2eeac34dab6404c7e5073e7d120c18d47b055c8db0a5046f9bc67bd6155312731bb1a53fcb367f436ae06c02c0a632338be344a1db4e6f6cac555e23ba48b21a4f34c519227a366f50ba533c218399ab4eda1eef88820e9fdcb8bbe6224cbbe139d4bbcbbbd4d5989b2f356f36c04f225c2685d2d8ed9c2a12e581e3ea5831ba35bed9e5dea3ffa26b854455c3b5a18742c56f1e36a16c81feec21d373d4ddab4f077b202de90f4f642fda6fae82b0bb1884cfc6e48682b599dae461a35a425bc3d781f859cb1ee26c3777df8f2f086fb20216fb8382ea56b46a686d30d001ca50498d187f9febd468d11eaf5580686ec0cbec6b7b0f50af4a2cb4b0ad029041ab56b1f9f1cd9da1760500f6ef51719abe150a5e28d766f9c7a9dbb60e01da345270fb6a6c14bf610216807c55a84526f8348467726bebb295de314d0482206b982643daa0f01e7d67340baf4ab3754de0f8eea8394fb612ffa16e9e748d568d0a998ae62b68649cb88a1bfc2a59f26b5ac579e021ae4bbef359294418449e471addd9819a126ad1dd5dbe4cbdc797ff717ce20f97fcf603e6af7d34d67b197e842d2cdb3ce25559d8b009856e2702e3755ca9dbd9e4acb2a94c1d50d07573d06ab0de8e7b3e5376a81575779dffe62b462261a7137afd65c4c7829c31053947593783262a4b2b203d6f9ad4ac60678353c01e22f5d4bd2e6f0fd889ef6ccc80ae9b7f34c4a63723aff83a1d46f277a8d99e5222a0b94d480c8b0fdf3d35a90237f3d3dc06f5163176addb05575911efa8af9e7489b0c9af2d98fc1827735601361a3f4a7c17949dc843fb616e1a8d834048f375faeb13220ffe84df3529d3a338a445990d3e169b193d1f81ab8d61d19267273a8c2fd7ff63336030503dcc0e1c00054517a1f1b69e605beaea4b77292a5f7fb4d0097e17263c8178946fe2e63436950589cd6c47bd3aeb9fb770266859a21cb45d4b82311294962bd22a093bb7312865afae7d48e1dfbc53112097cff6ef83b77c1868665b29f860cfcfba1bea20083f4a121d69eb081c4551d38c7b0cc956bac796cc290c5f430da88a0cb78bcee14b0b0424225e497e870b9f27e5047e6264bb475cd1fe945add78894e3a7f5a96acedbf9bb97f836b9e0e45a45c054eef565ef04bca9bdf1b0bd55924623836c71d14758431814b4851988fe216cd2386bb5acdc7dfca7df4a863ff5b39d9f142e442978c89280ff57430a7c391b942026d707437de45f5f32d8386c1b4418dd2934f4c91d916e3b0b6d89664c443a06878b003548694d0ad606d0ab610506e3a1fa5ee87e64b31ebcc2c0abcc2de22dfce5440e06be92cd9602c0dfd3101e389481cc1e83abb2d91c084c495630131114a13fb6c70a10b23d498af67b2add0711dc9e6e946c31a76b52867cf2b98cc309f3c41160318683cf3c06b5210a938a4939c1df0a5d915e4b134ab6d811435aaba30b7b6ce6f7c994ffd7f6f9295e30cdda20fbd04e7740bf8dd5eb4955de001aa27eb246080011f9da4478cfe94897419a28a11893935b4c86b3ddc77225658bcf2d1a3f3415ad437bd651090b24c584a6191f177d7049a3b9bdba835d82c14e39d90e0981538ee32a9d9a9fb848c1f096286a5ae8c20fa4b8795756963df015c4318fbbe7212fbd72a2f989bde82ebe59045a01cca8f321c7bfa8df65943e3340bb81196e4cf1021f5ffaef46723bcec0c6bdcfaa808ad84ee8ddf8f98291e1578f4c14b6e1c5de1fd51d3b264077628eb04b10bd1fdf50e1f10d992112c84422748fe0f8344920b240a4d04612dd2ba6da888d33e0407f463e7d3abb3c5ed01de1f4e023a7041b7dc3ee725b23c9a5a68aeff97ad2bd0ab6f944f6681199a88f60b75192edfd4dbc8977a9eb565204bbd445510689d47717130c398c7ea433cb06fb41de87c425c5278f4684603a263c117f4023dbfe2e0d7e54a150e14b11491be63ef0b31e213c4ea16278f6ed801a239495f1c80d7fd774d36ae4973e37dfaae51408ea72cd0a4abf7aea02bfd16d1c84a7d0aba6494670c4665be653d45b257246a9abe38951cd63467e89b2726cc97423aa6d94340c8b89067376a912c61444a21ef9c36310aaf41211c6bbc6e6109cdd82e1ed3367762161653cc7f272c3f8b45dc7e5e6219d62129004c4c2931af2f49416f10be15e1cd2c2641fb26fa4d1472ff176533026018d58f3c0e0ac3c6590a2fcb30c67c72a1e856c486ae55d51ea1a2d000685bd746fc36f336646fdf523933a495fd4297c3126be5055d8cd3486e78a59007dcc3416cd16b7ee059a0158d32cd2e7707c0fa089df1bed31b77e5637ed70edf604777e0f81bf254234fc34a63172abf72797f7308911900edc79aca613b1d7b45034cca37be8d86080b388b75426f980d81221905f8e7f0e775bc8bd7dff222f9779df8b117af9fd7a3cffb6f35f9d370c40c0c94fc7ec5b6ac305773950ced1a72b415f35673f4b306f2d641eae8bdc68019a5011ec700865dc840eb29f5fd650ffdf5983eb10f6ccc5c55d50e9bd95da7cd7b6ce48057e143451419529006bec3d63450e22e0892d647bc7bad9c53c1e1efb1feae5186fe8512c7268dac2e174f2506efcded72b306e1ef9f98df2079356a5829bb355ead6defd57dc6b0ba07909b25403d9f720615a686727f99f3eeb06ff432be6d5dffa8a24ffe73840bb6efe5ac45384b27811b0f928e4e827e73afaef9f993a3e85f9969f12a38f2f257ed1835d929ddd64442d70367a8ac8eab089c13b57afa3df5bc282007b89fc21002e9691da75ca907dc77f94bb9c0ca08448dac0d632b405d3b92da2d5148bebe87ec9b7b6dfe21ff000c4cd84a92833b5120fd89d7d46ea20446807e6ebb8c68bd2eb9d0ff3498c8d1dad2fb50bd5d0aab74bb5ad58463679037f7140da4b7b0920eb617940a4def237debee5d9358be4f2b0d9fe10f8f4cdcf73759b1dea60302030c1cbb1cb390cc5d40e6f9c324902d6578d26ff419b23e4cbd6efdfbf8f69a5f6ba475e4670ddcb630448e85c69bd4bcc2663b649ac01a88a69ed8b39b540786fe3040c8312359b2d21a2e39007e58d73b71cbe6a1fca0bcb2638eb6dd55baace4ed30f712c8b1d29c96bf3535891b00831bde876aa98cb04fa8f8b089", 0x1000}, {&(0x7f0000004140)="6d7f345b53dd0a4a5bee3630a7820a0b875adb7a7820ed3ff5d05a982011802585c700b74f902085f6f25711bb373efaf52d946debe899ca6d88f6c5d787871c58bc165ddc79db8fbbc3ed06c80e8bd733b2b8f01c0d855db1b2ee73b7d5a7a426d209745c07368ca62c0ee1147cbc9ea3b29659c1", 0x75}, {&(0x7f00000041c0)="f081fa4aadca73651f6412d5c2953fb33922416fa5271ca7052be3bba311580c486adcf729348d22fdb7837f60e50f9422cc09d6589fc315cc4f25cdc6aa52f1cf83d494438a72090ca59444f67008d603533a2b747d43b885ac82c6c7b63521d95fc75d514fa35ec7085e3e99a8dd905c4a42ae3013c012d5a023", 0x7b}], 0x5, &(0x7f0000004500)=[@cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r16, r0, r0]}], 0xf0, 0x1}, {&(0x7f0000004600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004940)=[{&(0x7f0000004680)="6c533b137d85", 0x6}, {&(0x7f0000006f80)="eef6398178c7dbc031a7ddced86255d67805607c8474eb2b0798283901d5a9497cd33ce7e6f11d06a83070c087eaae792c605a73bcea283edf2d162d5393b580a8eeb42490d3684030b532e12f778150d440c9365793147607d223ebed7eb41c3037fd77f0d8f59bfe59463aa5ca722bb7", 0x71}, {&(0x7f0000004740)="9b8137e8cbdee80c151182e7a77c265511a708f6b1fb82de40a6c1c012e7f51eb5b3ae5274760974c03e6ea3281ca647ff9c50e2e35dfa312ec67ca4674f107db1c8ba96a86f631ad384a8d38fb3a675143ede0f452bc5bed75e55901a062e0a325de2fdeacea4093221d67f4fd0568682e4387a4f020393c9fc21e81bb2414ddaf21d8f03120a2f04de", 0x8a}, {&(0x7f0000004800)="ae7d9da0f28c73f44900eb050d1b432d055316fa535797831eada6dc6339898830f57d8a09d29ddef60bdf0ea97ad01c854898ee1d7ec432b612853d4389512cc3ba1b6ddc6519bfd977c3f8c6f8d4e4bbc477b9cf86a2627124d7084b1f867bb8fc6c47afa05ce0e3ca4d207ba0b2d3b4b65e5dff6c176708309ed968e03e7add184b34ee", 0x85}, {&(0x7f00000048c0)="a0722c96871a8f8c3cc01dc6197e0b4aec27f75b845e466d95aebcd5ebd487b23cd35ac3639c36ac865a3fefdd2cac2d250c2a44eed952448addb5fe694f0af9eee8a0e0f9c5e8944b0433f5645102df871764f99940fdbd07978906b2b72acc5e108b9f99d8263ef5d352", 0x6b}], 0x5, &(0x7f0000004d40)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}], 0x108, 0x4000800}, {&(0x7f0000004e80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005100)=[{&(0x7f0000004f00)="2d523481cec6bf4c07c37d416051f02f59aec07ccd566edcd4338736cb054fe961dc5ad527c1d8787fcd6da9fe4a18e4782a067360b1f5b619919dc914793735521ae9e2fbfeb162e06c64bba016dafd5a03fd6266580aba5953e4b2", 0x5c}, {&(0x7f0000004f80)="b4052ca1d5d2d1c90e3d0143e43cd3ee6a954764b9d409d7e12edd8f12044d20f069ac3c210230f88027e21e23052d6daa70d5ea4ee8a6d022b9c2f345", 0x3d}, {&(0x7f0000004fc0)="91993a", 0x3}, {&(0x7f0000005000)="00e64854a7ffbb1d13d2ae89d87d0ce47883fd5818df9b67aa0d4c18334ac6d78791b7032151df7b1b0668e73d0254bf5c0ade2764ed1d343690962c13d6f8e71b6074e8aac78058be8ab3d1b99e01e82b759d99e1a2cda78abacd3e38cc5a5d06fb13d90ed059f0beb09a76ed2cab45c68cb720ec7e41b81a2076d1bc1fe554d6a28d6350eb83a213b5ef4642c02423473d792b538123075b4a84fbe03336123a1ad6f4946eb5144967aa3cbebb5c0e9285cbf16da825d867305908a4ef2559c1dc6900c6e8936efc38123bb768752f96356644e9889d242bb01a16c26d70e418f7b03373676dc802b66ffb639b25", 0xef}], 0x4, 0x0, 0x0, 0x800}, {&(0x7f0000005140)=@file={0x3e5b1dfab71052d3, './file0\x00'}, 0x6e, &(0x7f00000064c0)=[{&(0x7f00000051c0)="3f111f76ca8bcff43ebbbc6598ce3b8f9abf6f939dd30e37c636b5487b591d4802f93d5a9e7af39d7d111ad61ba73aafdce32281b1690e477b96277067d1c68b85b2cb3f4847c3e3d3e08538f8a4bc59f0b8a34d41596dcece132eda0a4c89c49c72caf3fc72e8d713e906fbdf4f0c7eac96b53bec4b6ccc32f853cac084a808aac49fea0abb7ef7afb02e1bfc5ee18e34c524ef2c2004834691983c4bddf046110296b1631dc057d64f9943b8fcee9cc2fce39369bf894aa694fc703f8922cede8d8f6fae0976c8968907c921bc7cc79eb19d87fdb398bee599ee968d9037080fb5", 0xe2}, {&(0x7f00000052c0)="86e83d0f29451c36cd21d9cf1142d03c7ce7ff37088ae445972373450a29ce77ce3931f7ecc1aab2c35abd9c99640328f1d80ca843e75e3b6a9f059dd7c0b278d9a6fca15b7e19014f62f42930d7cd6ca2c7138de7be57f81ed7323003c641a4b7977cf2ec6b11bf4f7896ad3e74bf8536d3c7746c1a42e8e8a5a3a14460a3095e6d407d57ecace7efc40dc2f58aa98e641cf5", 0x93}, {&(0x7f0000005380)="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", 0x1000}, {&(0x7f0000006380)="b633a43701387e57eeb727cd15933beb6a717665265c90dcadd31ce3a8ef95fdf215ccf3d3a66ba6643038b748c422d9c5a45fbf1893f2046067e5a688d7bde39db60ff414b0cee0d675c6b3afb1788c6c51077f374f28dafc534720ede6b4894cd36c2f48aab0898916aca7f23e85b23d495104734c1ff8316c6aa6a601f3e71c49886b2ad4f9", 0x87}, {&(0x7f0000006440)="c5903e213d830a86dfeab357654bc159f3f2e9e45d4b1ef479b3947969d51fd7a7cccf1aedecc0796131a47bd60eca6b96e4667d72f9e22668f3778b5ad20a5a2efa5cf4d027", 0xfffffffffffffe7e}], 0x5, &(0x7f0000007000)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x0, 0x1, 0x1, [r16, r0, r0, r0, r16, r16, r0, r0, r0, r16]}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0xa8, 0x4000000}, {&(0x7f0000006780)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000006d00)=[{&(0x7f0000006800)="ac81c39a805c8ba5ca8282d1972991c95dfebbd04d084f8926e169293f0c12d540d1d4895ad95b15caed19aae8d2d3c715b4e3eed4bd0eb87c00b1b233d89c5b1bd06366bd96e86e8693e7fa2216f8542b69b97a7013458092a7e1781ef4614b18e249851b22c6322494dcda31b69e732b9c4ea6c6fac78e9da00ec0324d1ce92b7569d8f7bb36e6aeb7dfa3f5f9a482b54df239a5688b2fb6c2d7500ccb02a8cedb1208934f77acc8c123195d2ac6a33505800c570694349cc1f69025c0caabacabf7c4383165c353b192786a1086dea30b60c257f318bf8d3f0f4cb75a6681e6fcc5b8", 0xe4}, {&(0x7f0000006900)="766d75738b4d88bed62cd4c22461db30c57841e9d0a2d061bdc88b197fbd206fdf0f51fc8050dcb95e9ea8f1c591f479070d3f5a596c2bd03758f9e0d9e77d7bb91c170ef0e072b04ad6784f2b781101282a5e2805145a4838ee7144bf9ca8d9f2616c95afa548a5902ec13c0acaedce9fb74bb5c1bfc676b76cbe5bbedbd7f8eb096965c516d5045560c9b1295c90e879e1d60c684783bd1eab7ac529a31a42e77c8454980c06ba4c31d626f3610e67ded9ec3d92e03e4aa8f6016dea6b12d3", 0xc0}, {&(0x7f00000069c0)="b5be6c56546ed3a3d58c78d91408ebe9fea623e409b0568d6acbceb1fa861d811e41af193a7e402614cde410d931926e9e7e39e472b8831ee16e8cc38afc250ab1082fdec359f8725698c20c73bbd262459a01b740f97e87f895efab05ced994652fe55d3dc140ab132c3bf9dd89ffb3e8363c56cce4735b66909412e6cd5004cbd2ce24a359ef2046f33050269ffc03b4b8f306dc8b81015c5cc82dea2413ad57f13329d141b9c26cf0a9c353ad84fd82f038ed2d5212f2", 0xb8}, {&(0x7f0000006a80)="56939821391c4dea5190d3b6288ea9c72a601fcd7293a4d129aa442634530b03b7a6b366fb80f53a1a4ad2d38f699ae6b2d3bee82e368771a961d51d953ce3894a7cee71c1e75fa8d9937511b07cddfeb09266d9b730d3b3cea16d501c28f1ae3e0b399dc7c42f", 0x67}, {&(0x7f0000006b00)="354da53331c6954098272c41518fcb0265f4aafe0c881af687e972119377dd662706765886d718f340bffc5abed4328691340b7ae9e73ab93b7cf67ba3c4c75a76fefe94509c84dfa290d0248af0b009e96d386f4b5ea0bd", 0x58}, {0xfffffffffffffffe}, {&(0x7f0000006b80)="47c3346ff0d41ebe84acd2730c5f50832c34a68a56b5d9f838f0c794146f8e0240b1dc09604426bd38f9f36265fc7efac195e79accd342291019a263fe817ed2cdf14cccfa03b8edb1e05da1d77c938978bb", 0x52}, {&(0x7f0000006c00)="9702752742e47d37db637317827481bd7660cb1c04e0d1128f01954f83533844184f0642c0a4342b7edddbd0173a90975a9f07d158e934392782a7251e9100336d6f57b5f79c9bcf3f7c47a9b72302370146858297b7ed0fa9300bb31ae004af12cfd74b087dbd1c7bc44e574918343b1a9d5f1af0f9d0742604f2d2c1865c297361c499aa4ac9f974bbc71429a05a340a97f2c3fc43a4247b9c9f88ce78b10369ca6201960afc23af11d3a42a2e4a108205535c37d24f9fd80f6536b97bb88ed143ab820ea9f87dbe688061f0", 0xcd}], 0x8, 0x0, 0x0, 0x10}], 0x9, 0x40) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x20000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r33, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0xffffffe4}}], 0x1, 0x0, 0x0) close(r32) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x190f, 0x0, 0x0, 0x0, 0x0) 14:19:34 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:34 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0) 14:19:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:35 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000000c0)={0x5, 0x2, 0x6, 0x0, 'syz1\x00', 0x80000000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0x8, "891fc765eb520336f7b91f36c978fe26"}, 0x12, 0x2) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 829.150631][T23930] IPVS: ftp: loaded support on port[0] = 21 14:19:35 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0, 0x8777ced8ad8354e5}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:19:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) 14:19:35 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 829.370339][T23990] IPVS: ftp: loaded support on port[0] = 21 [ 829.387712][T23986] IPVS: ftp: loaded support on port[0] = 21 14:19:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x376f090000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 830.159901][T23990] IPVS: ftp: loaded support on port[0] = 21 14:19:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, 0x0) 14:19:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:19:37 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() write$smack_current(r0, &(0x7f0000000000)='-[\x00', 0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:19:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 14:19:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 832.093057][T24024] IPVS: ftp: loaded support on port[0] = 21 [ 832.381943][T24024] chnl_net:caif_netlink_parms(): no params data found [ 832.516876][T24024] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.538680][T24024] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.564318][T24024] device bridge_slave_0 entered promiscuous mode [ 832.593895][T24024] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.616808][T24024] bridge0: port 2(bridge_slave_1) entered disabled state [ 832.658772][T24024] device bridge_slave_1 entered promiscuous mode [ 832.735134][T24024] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 832.763600][T24024] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 832.846966][T24024] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 832.872150][T24024] team0: Port device team_slave_0 added [ 832.892189][T24024] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 832.909919][T24024] team0: Port device team_slave_1 added [ 832.916192][T24024] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 832.924516][T24024] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 832.998006][T24024] device hsr_slave_0 entered promiscuous mode [ 833.065827][T24024] device hsr_slave_1 entered promiscuous mode [ 833.126411][T24024] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 833.165859][T24024] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 833.231687][T24024] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.238747][T24024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 833.246178][T24024] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.253276][T24024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 833.334103][ T8181] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.351834][ T8181] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.442427][T24024] 8021q: adding VLAN 0 to HW filter on device bond0 [ 833.485144][T24024] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 833.511289][T24024] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 833.519430][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 833.542057][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 833.552529][T24024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 833.559568][T24024] 8021q: adding VLAN 0 to HW filter on device team0 [ 833.585104][T24024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 833.601469][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 833.610278][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 833.631980][ T8185] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.639065][ T8185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 833.666469][T24024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 833.681917][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 833.698292][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 833.731744][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.738822][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 833.768368][T24024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 833.786404][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 833.808464][T24024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 833.839011][ T3471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 833.874228][T24024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 833.889650][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 833.899465][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 833.927787][T24024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 833.955460][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 833.967203][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 834.006246][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 834.038189][T24024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 834.046594][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 834.062223][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 834.073780][T24024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 834.091711][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 834.100530][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 834.124087][T24024] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 834.130832][T24024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 834.160279][T24024] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 14:19:40 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4f, 0x2000) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r3 = request_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='/dev/usbmon#\x00', 0xfffffffffffffffe) keyctl$clear(0x7, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:19:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 14:19:40 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 834.204919][T24024] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 834.280098][T24033] IPVS: ftp: loaded support on port[0] = 21 14:19:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 834.320762][T24036] IPVS: ftp: loaded support on port[0] = 21 14:19:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) 14:19:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5e00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 834.637197][T24056] IPVS: ftp: loaded support on port[0] = 21 14:19:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 834.816026][T24059] IPVS: ftp: loaded support on port[0] = 21 14:19:41 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000180)={{0x5, 0x4, 0x9, 0x3, 0x80000000000}, 0x9}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x80000000, 0x0, 0x3f, 0x4}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e21, @empty}}, 0x85, 0x400, 0x1, 0x4, 0x10}, 0x98) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x80000) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000240)) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x16, 0x27, 0x6, 0x11, 0x5, 0x2, 0x0, 0x16b, 0xffffffffffffffff}}) 14:19:41 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:19:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) 14:19:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 835.050210][T24069] IPVS: ftp: loaded support on port[0] = 21 [ 835.078581][T24036] IPVS: ftp: loaded support on port[0] = 21 [ 835.099449][T24077] IPVS: ftp: loaded support on port[0] = 21 [ 835.372145][T24084] IPVS: ftp: loaded support on port[0] = 21 14:19:45 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x140) msgget(0x3, 0x1fe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x7, 0xfffffffffffffff9, 0x8208, 0xfffffffffffff415, 0x7, 0x3c65, 0x49, 0x1ff, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={r3, 0x4}, &(0x7f0000000140)=0x8) pause() ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000200)={{0x2, 0x4e20, @broadcast}, {0x0, @broadcast}, 0x40a3665e48310ae6, {0x2, 0x4e20, @multicast2}, 'ifb0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 14:19:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 14:19:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:45 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_FPEMU(0xa, 0x3) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000140)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x56}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="88000000", @ANYRES16=r3, @ANYBLOB="040129bd7000fcdbdf2503000000240004001400010062726f6164636173742d6c696e6b00000c00010073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x15}, 0x20000000) accept4$nfc_llcp(r0, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x80800) 14:19:45 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:19:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 839.363666][T24091] IPVS: ftp: loaded support on port[0] = 21 [ 839.387585][T24099] IPVS: ftp: loaded support on port[0] = 21 14:19:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 839.412549][T24102] IPVS: ftp: loaded support on port[0] = 21 14:19:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:19:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) [ 840.132993][T24105] IPVS: ftp: loaded support on port[0] = 21 [ 840.194357][T24110] IPVS: ftp: loaded support on port[0] = 21 [ 841.383221][ T8740] device bridge_slave_1 left promiscuous mode [ 841.389571][ T8740] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.481785][ T8740] device bridge_slave_0 left promiscuous mode [ 841.487999][ T8740] bridge0: port 1(bridge_slave_0) entered disabled state [ 850.385674][ T8740] device hsr_slave_1 left promiscuous mode [ 850.447424][ T8740] device hsr_slave_0 left promiscuous mode [ 850.507156][ T8740] team0 (unregistering): Port device team_slave_1 removed [ 850.538930][ T8740] team0 (unregistering): Port device team_slave_0 removed [ 850.567291][ T8740] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 850.639070][ T8740] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 850.838783][ T8740] bond0 (unregistering): Released all slaves 14:20:01 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x80000001, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00032dbd7000fbdbdf250100050004000500080002000a0000000800040002000000030002fd7d0000000000080002000200ae5bfb0d4ce103200500080003001600001008000400000000000400bc823842f5dd8bcbd16412dfb044e0dedaccd4bda2a62d7b021193988eb3e39ab9258b3a1fd0642e0f500d54b411a1878f3bdba1e5dcf85813d448330b0e8fd133898b67416b2f8f217c00ff19b13ae4dbee23dcdb2a580de26e98"], 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r2) r4 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10010, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x60, 0x0, &(0x7f0000000180)=[@reply_sg={0x40486312, {{0x3, 0x0, 0x2, 0x0, 0x11, 0x0, 0x0, 0x38, 0x28, &(0x7f0000000100)=[@fda={0x66646185, 0x4, 0x3, 0x23}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}], &(0x7f0000000140)=[0x58, 0x48, 0x48, 0x30, 0x48]}, 0xe2c2}}, @increfs_done={0x40106308, r4}], 0xf9, 0x0, &(0x7f0000000200)="86663d986c292d386f3758f6152e83f919d898a0ea4a81eb8b03c172bfbf5735850e151e00c7d5dda014c20747ae543f876912355e557014f75db27ccdb5a3e400862f4b4253cffa6ff3c5a8846d7d0c42147832c66ad08d577bea8cbb9a9b2396d5bf5a10f2d5e483d1d454fd2ee9bd37e0123cf474897de2d0555130fa81140d59393598f2783d0ecdf7372c4f298d6ac4ef6438552bc4246eb69c13a2ed6e7ec5d06e5724124f18de87fabf1632529041a97a55698655b70a2e857098dd7a65dd7aba21fbfead8584d42bf427fa885750a207127cec2a5edac4df66dfd68699be613c1d76f6ad952686b4627a476abb9a871ee1e29c36fd"}) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:20:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) 14:20:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 855.596645][T24145] IPVS: ftp: loaded support on port[0] = 21 14:20:01 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:01 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x3ff, 0x7, 0x8000, 0x81, 0x3}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x3, 0x200, 0xfffffffffffffff9, 0x4, r3}, 0x10) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) [ 855.762257][T24158] IPVS: ftp: loaded support on port[0] = 21 14:20:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x908a0a0000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 855.809159][T24162] IPVS: ftp: loaded support on port[0] = 21 14:20:02 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x400) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) 14:20:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) 14:20:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 855.989004][T24173] IPVS: ftp: loaded support on port[0] = 21 [ 856.093704][T24164] IPVS: ftp: loaded support on port[0] = 21 14:20:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, 0x0) 14:20:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa800000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) 14:20:06 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) eventfd(0x3a9e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:06 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:20:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) [ 859.974044][T24209] IPVS: ftp: loaded support on port[0] = 21 [ 860.068776][T24217] IPVS: ftp: loaded support on port[0] = 21 14:20:06 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x80000001, 0x400) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f00000001c0)={r3, &(0x7f0000000100)=""/131}) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x8c8) pause() io_setup(0x7, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) 14:20:06 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) [ 860.323730][T24230] IPVS: ftp: loaded support on port[0] = 21 [ 860.357307][T24220] IPVS: ftp: loaded support on port[0] = 21 [ 860.366573][T24232] IPVS: ftp: loaded support on port[0] = 21 [ 861.095459][T24230] IPVS: ftp: loaded support on port[0] = 21 14:20:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:09 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$bt_cmtp(0x1f, 0x3, 0x5) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet6(r0, 0x0, &(0x7f0000000100), 0x800) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fc) restart_syscall() getsockopt(r2, 0x6, 0x101, &(0x7f0000000000)=""/166, &(0x7f0000000180)=0x14f) 14:20:09 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:20:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 14:20:09 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) timer_create(0x7, &(0x7f0000000640)={0x0, 0x34, 0x1, @thr={&(0x7f0000000140)="b781c2bdc4b0cd8606fb6bf394c589be7caf214d77ba69135627e75ac05ba4c7cc63058a081ff4d6e2f3f919a0b12cd10767bc99d3885a0309667f4e19b08163e6a9aef99c70c4ce381be8d5e814a6f56935b5e82ee30f21b9b4549bc5eb2eefb4d02fbf2b7bda70818bbae251ef80d7b00ab03528deac840951dfe8fb6560135c83df7cc9adba32f8c31d593377f7fb4a0e38ff7c8a1392c8edfa40", &(0x7f0000000200)="bdb8e4df31d9573e5d379b85c1d98f886f977a7c453dbc778aae5c1c4f90acbb28b2ba0bb928d4b6906a6471f4cef1376fac525feebf87f61314b87e3d777c276f3c965bc434d24d1ba0e30074c424f7afd52ee0981f7fccb4c623815fa83d36bc461fff0ec192dcd661e7ac00402c93a47f88d714edbf31e2945f35a08c873dc7cc4aa6587ac6e4f67d1a174c93158769eb3b19a29daa0c6254a8c46871c4c47be9e5efb659eabbac934b0ffaa38337d6"}}, &(0x7f0000000300)=0x0) r3 = open(&(0x7f0000000400)='./file0\x00', 0x400000, 0x21) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000440)={'broute\x00'}, &(0x7f00000004c0)=0x78) socketpair(0x13, 0x807, 0xd2, &(0x7f0000000580)) timer_settime(r2, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000380)) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000005c0)=r5, 0x4) ioctl$SIOCRSSL2CALL(r4, 0x89e2, &(0x7f00000003c0)=@bcast) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0xc) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$SIOCNRDECOBS(r6, 0x89e2) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000540), 0x10) 14:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 863.249190][T24256] IPVS: ftp: loaded support on port[0] = 21 [ 863.259310][T24260] IPVS: ftp: loaded support on port[0] = 21 14:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 863.301021][T24268] IPVS: ftp: loaded support on port[0] = 21 14:20:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) 14:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:09 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 863.573966][T24274] IPVS: ftp: loaded support on port[0] = 21 14:20:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:14 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:14 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES64=r2], &(0x7f0000000380)=0x1) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:20:14 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x1, r3}) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 868.074917][T24304] IPVS: ftp: loaded support on port[0] = 21 [ 868.143311][T24316] IPVS: ftp: loaded support on port[0] = 21 14:20:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x190f0000, 0x0, 0x0, 0x0, 0x0) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 868.493386][T24322] IPVS: ftp: loaded support on port[0] = 21 14:20:14 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:14 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000300)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000440)={r1, 0x88c2, 0x1, 0x5, 0x9, 0x40}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x7, 0x5, 0x3, 0x0, 0x0, [], [], [], 0x1c118419, 0x81}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getresgid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000540)) r4 = getgid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r4, r5) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x8f, 0x2, 0xcb4e, "e50c9a1bce098a6f57983938273a4df5", "ff7b84ba645b2be7b0b9c14919431cc61addc486ad2a563ba085b590fa17f6939234c15aed7452c55952bfb3cc8371db5cc07e0fc30b37ac0c7464c890113ecb0be96684af4c4533e5b697bee41747ed00ca3777f4466484e5ab856ae7ac3bb64b546d4241934df5ec88845c1a623a477da2a232757d72defe86"}, 0x8f, 0x2) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 868.847155][T24304] IPVS: ftp: loaded support on port[0] = 21 [ 868.922776][T24348] IPVS: ftp: loaded support on port[0] = 21 [ 869.676477][T24357] IPVS: ftp: loaded support on port[0] = 21 14:20:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e21, @local}, 0x1, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000040)='yam0\x00', 0xbe25, 0x8, 0x18}) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) keyctl$session_to_parent(0x12) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:20:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, 0x0) 14:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:17 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x57, 0x101, 0x84, 0x63ae, 0x6, 0x1, 0x7fff, {0x0, @in={{0x2, 0x4e20}}, 0x800, 0x2, 0x20, 0x3, 0xa78}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r1, 0x9a, "1682363069b2aebcf9de0ac65d6bf0ef22377e13ed8c8c8c80ae7101083dacc221f21dd999add1d6263580c574443522e6deeb8dbdcfb1b214f32d80068f161056b4c44d008cf717330d9034cc16bf6bb57f661e324a6afe53ea0bd43c675e9c7d1fe4bb08d5d83c965354f84c571c6d28ff8534032876024f684be70db25c63f82c32dfa09c2e3d55baa3408aab07746c715561bbef4a6898f3"}, &(0x7f00000001c0)=0xa2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r2) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:17 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:17 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 871.598816][T24364] IPVS: ftp: loaded support on port[0] = 21 [ 871.615866][T24367] IPVS: ftp: loaded support on port[0] = 21 14:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 871.660261][T24374] IPVS: ftp: loaded support on port[0] = 21 14:20:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 14:20:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, 0x0) [ 871.980309][T24374] IPVS: ftp: loaded support on port[0] = 21 [ 872.006629][T24378] IPVS: ftp: loaded support on port[0] = 21 14:20:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 14:20:22 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:22 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x80000000000000b) [ 876.145376][T24414] IPVS: ftp: loaded support on port[0] = 21 14:20:22 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:22 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="400100fdc548233c9925ab27731f8064fa706f2c09b5eb1596fb9a56a8580796fd6002019494e130cc3ada449e8c1229e35b7b3d5168c9c01247", @ANYRES16=r3, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) ioctl$KVM_GET_TSC_KHZ(r4, 0xaea3) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clock_adjtime(0x5, &(0x7f0000000100)={0x100, 0x3, 0x0, 0x200, 0x1ff, 0x7ff, 0xc6, 0x7ff, 0x1, 0x1, 0x10001, 0x0, 0xe7fd, 0x7, 0x1000, 0x3d, 0x100000001, 0x2, 0x37d35d11, 0x5a9, 0x5, 0x0, 0xa0, 0x1, 0xff, 0x1}) 14:20:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) [ 876.338976][T24419] IPVS: ftp: loaded support on port[0] = 21 [ 876.406531][T24425] IPVS: ftp: loaded support on port[0] = 21 14:20:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 876.452495][T24436] IPVS: ftp: loaded support on port[0] = 21 14:20:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) 14:20:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:22 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80c0) semget(0x2, 0x5, 0x401) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000012c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000080)=0x105) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x26}, &(0x7f0000000280)=0x8) pause() ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000002c0)=""/4096) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:20:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) 14:20:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 876.846173][T24454] IPVS: ftp: loaded support on port[0] = 21 14:20:23 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 877.637633][T24454] IPVS: ftp: loaded support on port[0] = 21 14:20:26 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000540)) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x14, 0x10, "32f495d73979df727f3062f4057277f4557bde62171a6c6f051321268c7848b576d061d54f8d11411d7ac667949a716e1d0e67709ef200908af3b9f1a1d004b4", "233ac944167ba4056b4b11797c9405010a80e6438ed51724d721cce0f7e2aac6", [0x4, 0xac6]}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) close(r2) pause() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10400204) 14:20:26 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:26 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) 14:20:26 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x80000000, 0xff, 0x7, 0x5}) close(r0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3, 0xfdf, 0x2a9, r0}) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:20:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 880.609811][T24473] IPVS: ftp: loaded support on port[0] = 21 14:20:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 880.726941][T24481] IPVS: ftp: loaded support on port[0] = 21 [ 880.750519][T24487] IPVS: ftp: loaded support on port[0] = 21 14:20:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) [ 880.950477][T24483] IPVS: ftp: loaded support on port[0] = 21 14:20:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) [ 881.522032][T24481] IPVS: ftp: loaded support on port[0] = 21 14:20:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, 0x0) 14:20:31 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:31 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$session_to_parent(0x12) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:31 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:31 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) [ 885.272001][T24534] IPVS: ftp: loaded support on port[0] = 21 [ 885.283697][T24532] IPVS: ftp: loaded support on port[0] = 21 14:20:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 885.343380][T24547] IPVS: ftp: loaded support on port[0] = 21 14:20:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) 14:20:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) 14:20:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 886.030489][T24542] IPVS: ftp: loaded support on port[0] = 21 [ 886.154077][T24547] IPVS: ftp: loaded support on port[0] = 21 14:20:35 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:36 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000003) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10001) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x1, 0x100000000}) 14:20:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, 0x0) 14:20:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1018}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:36 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) 14:20:36 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x100, 0x80000000, 0x3}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=r4, @ANYBLOB="a8e2d82ef128132206000000"], 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) 14:20:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:36 executing program 0: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 890.807115][T24596] IPVS: ftp: loaded support on port[0] = 21 14:20:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, 0x0) 14:20:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 891.025689][T24596] IPVS: ftp: loaded support on port[0] = 21 14:20:37 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) [ 891.187493][T24620] IPVS: ftp: loaded support on port[0] = 21 14:20:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 891.254090][T24622] IPVS: ftp: loaded support on port[0] = 21 14:20:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) 14:20:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 891.707849][T24620] chnl_net:caif_netlink_parms(): no params data found [ 891.844118][T24620] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.859484][T24620] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.877076][T24620] device bridge_slave_0 entered promiscuous mode [ 891.894641][T24620] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.909905][T24620] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.927698][T24620] device bridge_slave_1 entered promiscuous mode [ 891.989659][T24620] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 892.012008][T24620] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 892.068991][T24620] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 892.086555][T24620] team0: Port device team_slave_0 added [ 892.101503][T24620] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 892.117879][T24620] team0: Port device team_slave_1 added [ 892.132842][T24620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 892.150429][T24620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 892.264519][T24620] device hsr_slave_0 entered promiscuous mode [ 892.291732][T24620] device hsr_slave_1 entered promiscuous mode [ 892.332028][T24620] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 892.339783][T24620] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 892.380885][T24620] bridge0: port 2(bridge_slave_1) entered blocking state [ 892.388061][T24620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 892.395495][T24620] bridge0: port 1(bridge_slave_0) entered blocking state [ 892.402626][T24620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 892.527400][T24620] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 892.551624][T24620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 892.580234][T24620] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 892.615240][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 892.627514][ T2979] bridge0: port 1(bridge_slave_0) entered disabled state [ 892.642235][ T2979] bridge0: port 2(bridge_slave_1) entered disabled state [ 892.660452][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 892.682970][T24620] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 892.689747][T24620] 8021q: adding VLAN 0 to HW filter on device team0 [ 892.715914][T24620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 892.734961][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 892.744820][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 892.764633][ T8181] bridge0: port 1(bridge_slave_0) entered blocking state [ 892.771765][ T8181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 892.799757][T24620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 892.839745][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 892.852095][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 892.870542][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 892.877737][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 892.904474][T24620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 892.933407][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 892.950937][T24620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 892.972316][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 893.017042][T24620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 893.032469][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 893.051677][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 893.060446][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 893.122523][T24620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 893.142101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 893.150942][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 893.173720][T24620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 893.195156][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 893.211970][ T2979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 893.247783][T24620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 893.271694][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 893.280233][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 893.344009][T24620] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 893.350835][T24620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 893.447810][T24620] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 893.513127][T24620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 893.624940][ T8740] device bridge_slave_1 left promiscuous mode [ 893.639126][ T8740] bridge0: port 2(bridge_slave_1) entered disabled state [ 893.700444][ T8740] device bridge_slave_0 left promiscuous mode [ 893.710824][ T8740] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.054785][ T8740] device hsr_slave_1 left promiscuous mode [ 894.097820][ T8740] device hsr_slave_0 left promiscuous mode [ 894.157020][ T8740] team0 (unregistering): Port device team_slave_1 removed [ 894.183385][ T8740] team0 (unregistering): Port device team_slave_0 removed [ 894.208934][ T8740] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 894.273597][ T8740] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 894.441124][ T8740] bond0 (unregistering): Released all slaves [ 894.626607][T24652] IPVS: ftp: loaded support on port[0] = 21 14:20:41 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) poll(&(0x7f0000000000)=[{r0, 0x4}, {r1, 0x200}, {r1, 0x100}, {r1, 0x40}], 0x4, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:20:41 executing program 4: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 895.310594][T24657] IPVS: ftp: loaded support on port[0] = 21 [ 895.345754][T24660] IPVS: ftp: loaded support on port[0] = 21 14:20:41 executing program 0: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) 14:20:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) [ 895.539161][T24675] IPVS: ftp: loaded support on port[0] = 21 14:20:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) 14:20:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, 0x0) 14:20:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 896.078787][T24657] IPVS: ftp: loaded support on port[0] = 21 [ 896.129294][T24660] IPVS: ftp: loaded support on port[0] = 21 14:20:42 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x3ffffffd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:20:45 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) bind$ax25(r0, &(0x7f0000000040)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0x8) 14:20:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:45 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0xa02) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000040)=0x1) 14:20:45 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:45 executing program 0: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 899.008491][T24717] IPVS: ftp: loaded support on port[0] = 21 [ 899.033985][T24715] IPVS: ftp: loaded support on port[0] = 21 [ 899.098927][T24725] IPVS: ftp: loaded support on port[0] = 21 14:20:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) [ 899.871816][T24725] IPVS: ftp: loaded support on port[0] = 21 14:20:46 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x2004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) [ 900.176217][T24763] IPVS: ftp: loaded support on port[0] = 21 [ 900.957497][T24768] IPVS: ftp: loaded support on port[0] = 21 14:20:48 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x7fff, 0x3, 0xfffffffffffffbff, 0x5, 0x6, 0x3, 0x3f, 0x200, 0x5, 0x7}) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000080)={0x3a89e897, 0x6, 0xce}) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:20:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r1, 0x1000000000015) 14:20:48 executing program 0: syz_open_dev$media(0x0, 0x0, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:48 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x202, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x1, @empty, 'gretap0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0xffffffff7fffffff}}, 0x10) [ 902.683655][T24774] IPVS: ftp: loaded support on port[0] = 21 [ 902.716637][T24780] IPVS: ftp: loaded support on port[0] = 21 [ 902.719937][T24785] IPVS: ftp: loaded support on port[0] = 21 14:20:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa800}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96f37}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 903.525727][T24785] IPVS: ftp: loaded support on port[0] = 21 14:20:52 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0xb, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'L-', 0x1b82}, 0x28, 0x1) r6 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r0, &(0x7f0000000440)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f0000000540)={0x189c, 0x9, 0x9, 0x100, 0x70bd2a, 0x25dfdbfd, {0xd, 0x0, 0x7}, [@typed={0x8, 0x52, @str='\x00'}, @nested={0x288, 0x2c, [@typed={0x4, 0x56}, @typed={0x8, 0x59, @fd=r1}, @generic="8ec63d7a8c783cd080f4b3b02e5e12e9f7d5c27e4c878d2fc93e1a23a31536435c540e750534bf37ec4b615fde46d338eb5cab2ab39e1811862d4ea8ff570bdbe195f8f75be36e206e7952ece43520f1347a2de74271d868289b8bf79c5b4fa413006ce1a96ce3a353dc83ba9f7dd68556347587aca771050c5977a627d9876b966701a4d550c79b40f7a3ec037757155457272a231b5ebc8eed47079cc0cfeb17b6f441339d29ebc58b32bfd34d958159c186905c39b5594ea1b0b17f10441ac27939323457c48a0d5d990753a16aa09c281ebdb35dffd1b7", @generic="bd72f8e58c2c2c701fad1fef99389beb2221e785ad1c09f202ca5bb59d3abcbffdc405be2ee96fc8823c16dbee8db97d540ef312a318bfdb51993006fe95ace560e90f659af9c7275a33290ac079b05af97b9b74f9f65f63609b91f9c2736194065106fc16328487dd41299fb42d966f4477be2b0c303cba0baf15e01761a9f7bf871a3dd5f5e829e2021525507ab26be9f1bfd4897f76143d2792cb2fd98319b224635c", @typed={0xf0, 0x4e, @binary="9dc0059c849a0876170576b9e2949fa800b13ea926abf96b6f2eadd42b805ee7167687cea92f5f24221d7ed2aeea2e8ccce74d06ba797406c6176b309f96de90dff74663913c576009a511b79901913f095bc80849f2f29fd880023d11cdbecddcf7d71a3e5d875203ff8cf034c4c2fb185b8b1830bbcdb953005e89d51a34e0f1ef46f621f8c2865cae9f5f070b4854a480f97158fcae68542eea7db332e14b1310cac51e751b31fab0b05aaa0f7efe1201105999a2d156a24fcc5abe60f31e233cb9100d1ed1d6ffe2285e5da05b9563fcb04c504cf14aaac932478096d4cb12d855d2701112977335b06f"}, @typed={0x8, 0x20, @u32=0x1}]}, @nested={0xc8, 0x23, [@generic="0b951918ec6479a110949d181177662f006d72e9e5da510ef194e4e75f9a5a262652b19f853d541ceadfb3d2d672bc30cb05cc8a627502c7b2466c64238c11aee98d72bfdd35acf0563607d1cece28a45904def6d852daf9352c0dd2201e9e4a19c9fb9c60f9a0ba05d578b7a70555147b93369cb5dbf950f4baeba9209a897d5349af3914e223bbe59170008b11e472fbb8910563e91468e15bf7216411f425cd25078ce94e6b841aefd182c2abaaa148a1195dd04a434819", @typed={0x8, 0x4d, @u32=0x3a0}]}, @nested={0x88, 0x54, [@generic="1f3e394b2e1413b80ba35ef465b026fc63634e7e2b81b072c165380b0adabece68da7af25814c497d11b942e1288fb5517daf621f3782540b2678172813e93735a428b19a73880d814d63d84966cbb7922fec5f1b3b8e9546c019c70500f5034b3b5ab8dcfce55c9a491aafc3ca6e043f41d2da4dc4accf990c77fec7b146461c5"]}, @generic="988e163ca35668d69ebb5e7b98d96cf282f9e66bb6f9cb1809b94777d0c8e15888d17c5c4761d6657a369912094ba00a851ddb08f2639a0e8f436bb5dfd9abc1b39bdcd8d492c769447ba1ca489f657a54723d24006b570494fd4e28459db70c386011c7ecc02032fca5472d0991950c3f6075754d54b3ac0012dba72def42443d8b9f241721b791c264ef3ee02649819fd3940c2a63a00d5cb9df1079169530c93f917b38dfda533d048a6f2912e9f8f06a16d5f16abe6685b4d8c7b0d53aea3f17b4df50c08553498020bbd1b7e3e6af0a34302465232ece4136edc1a29499bcc6903e26dd13ae07c34400a4e5940ff86d24d6ead8add3", @nested={0x124, 0x95, [@typed={0x8, 0x34, @uid=r2}, @typed={0x8, 0x2e, @fd=r3}, @typed={0x8, 0x7c, @ipv4=@rand_addr=0x4}, @generic="67bccc89402b7f7448f81db52a9214859b17eaa3aea6a2bb6bc2495a97a29b795eaf808010441e09a11d5df9ea883e3e72120dd9c96ef21634ae90dce3e3e58be501fa4c1e96e7de300049c115", @typed={0x8, 0xd, @uid=r4}, @typed={0x4, 0x16}, @typed={0x8, 0x5d, @uid=r5}, @typed={0xc, 0x4, @u64=0xb5}, @typed={0x98, 0x49, @binary="e9023ffa0b0311fbc2c33fd4835a88dff43d99500f21c01b6d3851a45ee81e89c692acda1fd7ed24bd04f6f17e06c05c8e873a04367490bc5b555f93006098778b8387bfd944d22a8a0540058b9f5303928550452663de32cd6b4acf67c1a4008f901e9ca89beccc983028e0ddb65aad11c3f740a22329b288c51907ab6bf05d5c7f7bdde20d1e292e2746040f795a2720c4f371"}]}, @nested={0x184, 0x8c, [@typed={0x14, 0x78, @ipv6=@ipv4={[], [], @empty}}, @generic="2a4557906b47a3e52e83f01002dd023f8230f66e746bfea1ee66d2c69906a7d033", @generic="a52f453e9407458f25a11fcb21c840ecc228aa0609b0d4ba7b5c81fdd45e168721e30d2879d48096928850ed8f807db28f1d7586e232056f61394150d655b1c0f18327e366438ca3e58f", @typed={0x8, 0x90, @fd=r6}, @typed={0x4, 0x29}, @typed={0xc, 0x80, @str='[wlan0#\x00'}, @generic="1953aa199846553fa3c0f3dd5fbb2aa528b96e95398046f3dac020a4c30c9227", @generic="68458f350431b89359f16e1b008eb14a8bd03a034adde7593f5eb544071ee463008ad9cca608d4164b555d7461c1a75166546724659c8a73143664b6895e01756ec54cd2d7d067d92dc7dd9cdb484c880f6e6b18647cebacdd8b1d2dbef679ee8b299691b67402eab13cb54e73eee4549400c6e8da0e65f510a5b164ea2a695d4abb1333444722e6c85426f0f0ea92c417fdc6f00e04ba8190dfa7e6d56db17dfc51333197f4302f3e5edaf179dc803e3be779caada1f6f09eb0454029fb3a6b39032afe7f32018aa4"]}, @nested={0x1108, 0x84, [@generic="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", @generic="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", @typed={0x8, 0x1b, @uid=r7}]}]}, 0x189c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001e40)={&(0x7f0000001e00)='./file1\x00', r0}, 0x10) recvmmsg(r9, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r8) pause() syz_open_dev$cec(&(0x7f0000001e80)='/dev/cec#\x00', 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) 14:20:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa8a90}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:52 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x410202) 14:20:52 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) tkill(r1, 0x1000000000015) [ 906.739041][T24823] IPVS: ftp: loaded support on port[0] = 21 [ 906.765306][T24831] IPVS: ftp: loaded support on port[0] = 21 [ 906.780412][T24829] IPVS: ftp: loaded support on port[0] = 21 14:20:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x190f000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:53 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:20:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 907.172135][T24859] IPVS: ftp: loaded support on port[0] = 21 14:20:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 907.499894][T24823] IPVS: ftp: loaded support on port[0] = 21 14:20:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) tkill(r1, 0x1000000000015) 14:20:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:53 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x80024322, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:53 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 907.718633][T24883] IPVS: ftp: loaded support on port[0] = 21 14:20:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 907.786302][T24891] IPVS: ftp: loaded support on port[0] = 21 [ 907.982977][T24859] IPVS: ftp: loaded support on port[0] = 21 14:20:54 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:20:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 908.342121][T24913] IPVS: ftp: loaded support on port[0] = 21 14:20:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:54 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:54 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) tkill(r1, 0x1000000000015) [ 908.588905][T24928] IPVS: ftp: loaded support on port[0] = 21 [ 908.657703][T24937] IPVS: ftp: loaded support on port[0] = 21 14:20:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 908.929608][T24940] IPVS: ftp: loaded support on port[0] = 21 [ 909.088940][T24913] IPVS: ftp: loaded support on port[0] = 21 14:20:57 executing program 3: unshare(0x40000000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8280a767b41479cf) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f0000000100)=""/163, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="757365722e776c616e3165746831766d6e657430706f73697825af63a75f61636c5f616363"], &(0x7f0000000240)='.\x00', 0x2, 0x3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") clock_gettime(0x7, &(0x7f0000000040)) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x10) recvmmsg(r3, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000340)=0xf832, 0x4) connect$bt_sco(r1, &(0x7f0000000300)={0x1f, {0x7fffffff, 0x1, 0x6e, 0x70, 0xb}}, 0x8) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:20:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:57 executing program 4: syz_open_dev$media(0x0, 0x1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:20:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x1000000000015) 14:20:57 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 911.678590][T24963] IPVS: ftp: loaded support on port[0] = 21 14:20:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 911.724043][T24962] IPVS: ftp: loaded support on port[0] = 21 [ 911.731805][T24970] IPVS: ftp: loaded support on port[0] = 21 14:20:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) [ 912.113314][T24972] IPVS: ftp: loaded support on port[0] = 21 14:20:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18100000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 912.502312][T24970] IPVS: ftp: loaded support on port[0] = 21 14:20:58 executing program 3: unshare(0x40000000) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x480) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x100000001) pipe2(&(0x7f0000000000), 0x4000) 14:20:58 executing program 4: r0 = syz_open_dev$media(0x0, 0xadbd, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x76) 14:20:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:58 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x1000000000015) 14:20:58 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x376f0900}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 912.809975][T25010] IPVS: ftp: loaded support on port[0] = 21 [ 912.832622][T25014] IPVS: ftp: loaded support on port[0] = 21 [ 912.879189][T25007] IPVS: ftp: loaded support on port[0] = 21 14:20:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0) 14:20:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 913.140920][T25018] IPVS: ftp: loaded support on port[0] = 21 14:20:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0) 14:20:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:59 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000180)="95928387314b67a8abce6455e9948cdcdfa772e7cd7c88dbfbca9a1808795b6140cb72bff31e513438b0f6793da85f367ad773fa3b59c2420499b53fdeac5e7483a537d5816f56cb9325ad9e0a458a313c5e0f1dd20122820ccf675d17c4519109b3f666c03fc17c5d9f68f610c0bb989ce9d92f9fae549f3a830b8798abf3f1eef9389de35e5a9ee24ace3b7b82fef0c4d64ec1002e69aa624796ad06a3936fe7a417926687a9bfcee32697e685d4f0a04cdaaae9c8978f4a51527f977ea9b9d18715", 0xc3) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000000)=""/196) [ 913.399374][T25048] IPVS: ftp: loaded support on port[0] = 21 [ 913.539134][T25051] IPVS: ftp: loaded support on port[0] = 21 [ 913.619151][T25014] IPVS: ftp: loaded support on port[0] = 21 14:20:59 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) close(r0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) restart_syscall() recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x1}}, 0x20) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x401, 0x10000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r4, r5}}, 0x18) ioctl$SG_GET_VERSION_NUM(r5, 0x2282, &(0x7f00000017c0)) syz_mount_image$minix(&(0x7f00000001c0)='minix\x00', &(0x7f0000000200)='./file0\x00', 0x80000001, 0x8, &(0x7f0000001700)=[{&(0x7f0000000240)="70951a91fff50e79d939202ac65b4d8f5d56e6e2b6373c69775c1c39c829790c2ec1e1d3da84676195149786dda7e3b0c43e0f738d2716edf91d697b54dd64cae8a1d086e360b11522763b98a554fe15437421f24bcf087f41e33f56b7f6cc9c6c12dfaa511ed885d8daeae796096d8725992b39c2bd511f04b90637", 0x7c, 0x10000000000}, {&(0x7f00000002c0)="620eb3a4602408ea9ee4b39f0c0a39dbab22acd088361ff44579c9bf94fc667556b927aa3673e0a50cea7f8d901ba9e46b8f030792efbcd09f722bc1a9435b1f8f31e670824787c3347de226fbdf1c49cd8e844fef909307aac5710056c90e99128ad28c078ac86401b3041f09ccefee11b2a43044005d83e06239df", 0x7c, 0x7}, {&(0x7f0000000340)="158b1624138991e7fe5a5c4123ad07aa622e18c5f124bc9efcb3d3f846ec71af2e2a8ef099a65bcea17b37537d8f45ee3766b332da0ebcadf81fa63ad4569fd78333b34c5dd8d82268a2e6116bdba40eca15f9bfb19a07b2a14d97d4ec707e6b2761320f750a6d01a44c506359748e3327c49dd144b6063a3127a38f233e71592ad07c3db5cbd19dc4723e1f13", 0x8d, 0x5}, {&(0x7f0000000400)="a7d5ad346f4038bb86a3f0519603ce2eb8ab4a4d5ca5865ca54a60920a671c9aaf510f6fd31bdf5c687020daf2ec2df278c176e42d5ef22df23e61d7be1493b1d7bd25b297034a0122b1876211b5f4de2a07cfe70dcd1f2bbec6f9dd7e54bbb6f3c420fe1f44cfbe30e34f9049f92050048b223ddd02d00dc2c9ff51f3f299e0e28e604d59001b5d2c0309dbf408d3b81fb9962c44733bc920e4c05e5993458e03094834d3217a0f3b693a36e11f6718e4f830a99ed2242d630c0abd82f16acfdbab5548b88233e50679557e48eb3fbf1bff2a6409872f4d0c28d9f5c8439afa39ef169cc386202ae7c0d62447bf", 0xee, 0x8000}, {&(0x7f0000000540)="30b73a2b6b77944cd01b1996b93e94f8227fc50e8f4ba392d543a5ebf0a89033848b8e233235d55985248547b75f3b50d87a7ed0386df54fb3a31dd83409ff55a21ab9902593f82340a1ffee149fbde26e9001f20537e21c7d4fbb70c4bea13c25ac445e58ea48d5e824a3d18f7c0a33958277eda414f23461c2dd44ad8e3beeb32ac0e7562239b6f0ef76b6e4e7205eef9cf3b070d43b7a5d15", 0x9a}, {&(0x7f0000000600)="2bbb8758cb849bda62e42a97820e81d5dcaab74d65e45ca990b70d683d9f116820ee0d6a7ae17ceaf847320fa1fffc5da86d9a204898157d596c9253a315c457920d23b8ac61b031e4d89d2618dc80763a7dd80720563433a094bdb817fada9dba2caf0e", 0x64, 0x2}, {&(0x7f0000000680)="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", 0x1000, 0x3}, {&(0x7f0000001680)="4347b1bed6ff3d6c662ec785572d64f9010c52a709282a2b64cd9c5ccc3c6dfbd3470a3593f807102dded7194e3ac6e92edbf778dd2d8d176e9560d83f1488319ba009250a89e40191b05cf4592cd265f3da566193de65105951ea632b1d3daeffca6622c2e98c7a1c49fdd66cc897805841c5863445", 0x76, 0x8}], 0x8000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x9) 14:20:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0) 14:20:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:20:59 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:20:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(0x0, 0x1000000000015) 14:21:00 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='\\}\x00', &(0x7f0000000080)=',(self\xce(\x00'], &(0x7f0000000240)=[&(0x7f0000000140)='imd5sum):mime_typemd5sum/\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\\wlan0@\x00', &(0x7f0000000200)='(/wlan0$\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:21:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 913.953757][T25061] IPVS: ftp: loaded support on port[0] = 21 14:21:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, 0x0) [ 914.033385][T25075] IPVS: ftp: loaded support on port[0] = 21 14:21:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:21:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:21:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) [ 914.795864][T25075] IPVS: ftp: loaded support on port[0] = 21 14:21:02 executing program 4: r0 = syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r1) pause() signalfd4(r0, &(0x7f0000000000)={0x7ff}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:21:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:21:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 14:21:02 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:21:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x0) 14:21:02 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) accept$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) close(r0) pause() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 916.933705][T25106] IPVS: ftp: loaded support on port[0] = 21 14:21:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 916.986790][T25114] IPVS: ftp: loaded support on port[0] = 21 14:21:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:21:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 14:21:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 917.332756][T25106] IPVS: ftp: loaded support on port[0] = 21 14:21:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:21:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) [ 917.754069][T25121] IPVS: ftp: loaded support on port[0] = 21 14:21:07 executing program 4: syz_open_dev$media(0x0, 0xadc1, 0x0) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/7}], 0x0, &(0x7f00000000c0)}, 0x4}, {{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/142}, {&(0x7f0000000240)=""/122}, {&(0x7f00000002c0)=""/207}], 0x0, &(0x7f0000000400)=""/245}, 0xacd4}], 0x1, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) close(r0) pause() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:21:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:21:07 executing program 0: syz_open_dev$media(0x0, 0xadc1, 0x80000) clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:21:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) 14:21:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0xbf, @time={0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x40505330, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r1, 0x0) 14:21:07 executing program 3: clone(0x1000202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x40000000) socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(r0) pause() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:21:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) [ 921.742350][T25155] IPVS: ftp: loaded support on port[0] = 21 14:21:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 921.816441][T25160] IPVS: ftp: loaded support on port[0] = 21 14:21:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x5, 0x0, 0x0, 0x0) 14:21:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 14:21:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x6, 0x0, 0x0, 0x0) 14:21:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000519fa8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}, [@ldst={0x3, 0x0, 0xb, 0x1, 0x0, 0xa4}]}, &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) [ 922.371145][T25155] kasan: CONFIG_KASAN_INLINE enabled [ 922.376904][T25155] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 922.385068][T25155] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 922.392027][T25155] CPU: 1 PID: 25155 Comm: syz-executor3 Not tainted 5.0.0-rc3-next-20190122 #17 [ 922.401042][T25155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.411175][T25155] RIP: 0010:nf_ct_gre_keymap_flush+0xb9/0x2f0 [ 922.417250][T25155] Code: 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 0f 85 2b 02 00 00 4c 8b bb f8 16 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 f9 48 c1 e9 03 <80> 3c 01 00 0f 85 fc 01 00 00 4c 3b bd 68 ff ff ff 4d 8b 27 0f 84 [ 922.436858][T25155] RSP: 0018:ffff88804b687698 EFLAGS: 00010246 [ 922.442929][T25155] RAX: dffffc0000000000 RBX: ffff88804a121840 RCX: 0000000000000000 [ 922.450905][T25155] RDX: 1ffffffff146dfc2 RSI: 0000000000000004 RDI: ffff88804b687600 [ 922.458877][T25155] RBP: ffff88804b687748 R08: 1ffff110096d0ec0 R09: ffffed10096d0ec1 [ 922.466853][T25155] R10: ffffed10096d0ec0 R11: 0000000000000003 R12: dffffc0000000000 [ 922.474828][T25155] R13: ffff88804b687858 R14: ffff88804a122f38 R15: 0000000000000000 [ 922.482819][T25155] FS: 00007f1b18c8e700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 922.491752][T25155] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 922.498377][T25155] CR2: 000000000070a158 CR3: 00000000a5f04000 CR4: 00000000001406e0 [ 922.506365][T25155] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 922.514349][T25155] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 922.522321][T25155] Call Trace: [ 922.525642][T25155] ? nf_ct_gre_keymap_add+0x7e0/0x7e0 [ 922.531086][T25155] ? nf_conntrack_tuple_taken+0x10b0/0x10b0 [ 922.536999][T25155] ? __might_sleep+0x95/0x190 [ 922.541686][T25155] nf_conntrack_proto_pernet_fini+0x16/0x1a [ 922.547598][T25155] nf_conntrack_cleanup_net_list+0x204/0x330 [ 922.553594][T25155] ? nf_conntrack_cleanup_end+0x160/0x160 [ 922.559348][T25155] ? kmem_cache_free+0x225/0x260 [ 922.564291][T25155] ? pde_free+0xb5/0x110 [ 922.568550][T25155] nf_conntrack_cleanup_net+0x1c5/0x270 [ 922.574115][T25155] ? nf_conntrack_cleanup_net_list+0x330/0x330 [ 922.580273][T25155] ? nf_conntrack_init_end+0x170/0x170 [ 922.585752][T25155] nf_conntrack_pernet_init+0xc3f/0xf00 [ 922.591303][T25155] ? nf_conntrack_hash_sysctl+0xd0/0xd0 [ 922.596867][T25155] ops_init+0x109/0x5d0 [ 922.601035][T25155] ? net_alloc_generic+0x70/0x70 [ 922.606003][T25155] ? lockdep_init_map+0x10c/0x5b0 [ 922.611053][T25155] setup_net+0x38f/0x940 [ 922.615315][T25155] ? rcu_pm_notify+0xd0/0xd0 [ 922.619928][T25155] ? ops_init+0x5d0/0x5d0 [ 922.624273][T25155] ? down_read_killable+0x90/0x150 [ 922.629393][T25155] ? copy_net_ns+0x289/0x4b0 [ 922.633992][T25155] ? down_write+0x130/0x130 [ 922.638511][T25155] copy_net_ns+0x2ae/0x4b0 [ 922.642994][T25155] ? cgroupns_put+0x60/0x60 [ 922.647511][T25155] ? net_drop_ns+0x30/0x30 [ 922.651938][T25155] ? kmem_cache_alloc+0x341/0x710 [ 922.656972][T25155] ? __might_fault+0x12b/0x1e0 [ 922.661744][T25155] ? apparmor_cred_transfer+0x670/0x670 [ 922.667304][T25155] create_new_namespaces+0x4ce/0x930 [ 922.672615][T25155] ? sys_ni_syscall+0x20/0x20 [ 922.677303][T25155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 922.683560][T25155] ? ns_capable_common+0x93/0x100 [ 922.688666][T25155] unshare_nsproxy_namespaces+0xc2/0x200 [ 922.694317][T25155] ksys_unshare+0x6d7/0xfb0 [ 922.698847][T25155] ? kasan_check_read+0x11/0x20 [ 922.703709][T25155] ? walk_process_tree+0x440/0x440 [ 922.708838][T25155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 922.715096][T25155] ? do_syscall_64+0x8c/0x800 [ 922.719777][T25155] ? lockdep_hardirqs_on+0x418/0x5d0 [ 922.725081][T25155] ? trace_hardirqs_on+0xbd/0x310 [ 922.730121][T25155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 922.736383][T25155] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 922.742458][T25155] ? trace_hardirqs_off_caller+0x300/0x300 [ 922.748277][T25155] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 922.753757][T25155] __x64_sys_unshare+0x31/0x40 [ 922.758528][T25155] do_syscall_64+0x1a3/0x800 [ 922.763285][T25155] ? syscall_return_slowpath+0x5f0/0x5f0 [ 922.768926][T25155] ? prepare_exit_to_usermode+0x232/0x3b0 [ 922.774665][T25155] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 922.780232][T25155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 922.786130][T25155] RIP: 0033:0x458099 [ 922.790030][T25155] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 922.809639][T25155] RSP: 002b:00007f1b18c8dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 922.818058][T25155] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458099 [ 922.826038][T25155] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 922.834018][T25155] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 922.842081][T25155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b18c8e6d4 [ 922.850063][T25155] R13: 00000000004c6d60 R14: 00000000004dc280 R15: 00000000ffffffff [ 922.858051][T25155] Modules linked in: [ 922.862027][T25155] ---[ end trace 88887a1b76d6af3e ]--- [ 922.867517][T25155] RIP: 0010:nf_ct_gre_keymap_flush+0xb9/0x2f0 [ 922.873642][T25155] Code: 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 0f 85 2b 02 00 00 4c 8b bb f8 16 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 f9 48 c1 e9 03 <80> 3c 01 00 0f 85 fc 01 00 00 4c 3b bd 68 ff ff ff 4d 8b 27 0f 84 [ 922.893301][T25155] RSP: 0018:ffff88804b687698 EFLAGS: 00010246 [ 922.899388][T25155] RAX: dffffc0000000000 RBX: ffff88804a121840 RCX: 0000000000000000 [ 922.907427][T25155] RDX: 1ffffffff146dfc2 RSI: 0000000000000004 RDI: ffff88804b687600 [ 922.915455][T25155] RBP: ffff88804b687748 R08: 1ffff110096d0ec0 R09: ffffed10096d0ec1 [ 922.923506][T25155] R10: ffffed10096d0ec0 R11: 0000000000000003 R12: dffffc0000000000 [ 922.931532][T25155] R13: ffff88804b687858 R14: ffff88804a122f38 R15: 0000000000000000 [ 922.932697][T25184] IPVS: ftp: loaded support on port[0] = 21 [ 922.939515][T25155] FS: 00007f1b18c8e700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 922.939524][T25155] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 922.939533][T25155] CR2: 000000000070a158 CR3: 00000000a5f04000 CR4: 00000000001406e0 [ 922.939545][T25155] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 922.939553][T25155] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 922.939562][T25155] Kernel panic - not syncing: Fatal exception in interrupt [ 922.946520][T25155] Kernel Offset: disabled [ 922.997320][T25155] Rebooting in 86400 seconds..