xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0) 17:38:09 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)="84", 0x1}], 0x1) 17:38:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) [ 660.938575] IPVS: ftp: loaded support on port[0] = 21 17:38:10 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, 0x0, 0x0) 17:38:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0) 17:38:10 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, 0x0, 0x0) 17:38:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0) 17:38:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0x73c, 0x4) getpid() getsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000001c0), &(0x7f0000000240)=0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000200)=0x2, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ftruncate(r2, 0x80080) 17:38:10 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, 0x0, 0x0) 17:38:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0) 17:38:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 661.962001] IPVS: ftp: loaded support on port[0] = 21 17:38:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0x73c, 0x4) getpid() getsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000001c0), &(0x7f0000000240)=0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000200)=0x2, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ftruncate(r2, 0x80080) 17:38:10 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540), 0x0) 17:38:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, 0x0}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00)}}], 0x2, 0x0) 17:38:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 17:38:11 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540), 0x0) 17:38:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:11 executing program 3: mknod(&(0x7f0000000580)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) quotactl(0x2080000201, &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000000)) 17:38:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0x73c, 0x4) getpid() getsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000001c0), &(0x7f0000000240)=0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000200)=0x2, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ftruncate(r2, 0x80080) 17:38:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 662.946545] IPVS: ftp: loaded support on port[0] = 21 17:38:11 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540), 0x0) 17:38:11 executing program 3: mknod(&(0x7f0000000580)='./file1\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) quotactl(0x2080000201, &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000000)) 17:38:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 17:38:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0x73c, 0x4) getpid() getsockopt$sock_int(r0, 0x1, 0x28, &(0x7f00000001c0), &(0x7f0000000240)=0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000200)=0x2, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ftruncate(r2, 0x80080) 17:38:12 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540)=[{0x0}], 0x1) 17:38:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 17:38:12 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540)=[{0x0}], 0x1) 17:38:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_CHANGE_FD(r0, 0x4c02, 0xffffffffffffffff) 17:38:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x18, 0x35, 0x835, 0x0, 0x0, {0x3, 0x1000000}, [@nested={0x4}]}, 0x18}}, 0x0) 17:38:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x84, 0x0, 0x0, 0x0, 0x0) 17:38:12 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540)=[{0x0}], 0x1) 17:38:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 663.768059] IPVS: ftp: loaded support on port[0] = 21 17:38:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 17:38:12 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1) 17:38:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) fsync(r1) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r1, 0x11, 0x7ffd, 0x8000) fallocate(r1, 0x3, 0x0, 0xfff9) 17:38:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x84, 0x0, 0x0, 0x0, 0x0) 17:38:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:12 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1) 17:38:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:13 executing program 1: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1) 17:38:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:13 executing program 5: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) umount2(0x0, 0x0) openat(r0, &(0x7f0000000080)='./file1\x00', 0x8840, 0x14) 17:38:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) fsync(r1) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r1, 0x11, 0x7ffd, 0x8000) fallocate(r1, 0x3, 0x0, 0xfff9) 17:38:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) fsync(r1) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r1, 0x11, 0x7ffd, 0x8000) fallocate(r1, 0x3, 0x0, 0xfff9) 17:38:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:13 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 664.707432] IPVS: ftp: loaded support on port[0] = 21 17:38:13 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:13 executing program 5: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./bus\x00', r0, &(0x7f0000000040)='./bus/file0\x00', 0x0) [ 664.891458] audit: type=1400 audit(1554917893.742:72): avc: denied { execstack } for pid=13288 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 17:38:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:14 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:14 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:14 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:14 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:14 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:14 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:14 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) [ 665.668669] IPVS: ftp: loaded support on port[0] = 21 17:38:14 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', 0x0, &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:15 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:15 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:15 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:15 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:15 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 17:38:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:15 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) [ 666.545994] IPVS: ftp: loaded support on port[0] = 21 17:38:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:15 executing program 1: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', 0x0, &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:15 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) 17:38:15 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:15 executing program 1: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:16 executing program 1: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:16 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:16 executing program 5: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 17:38:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 17:38:16 executing program 1: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) [ 667.473954] IPVS: ftp: loaded support on port[0] = 21 17:38:16 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 17:38:16 executing program 5: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 17:38:16 executing program 1: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:16 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', 0x0, &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 17:38:17 executing program 5: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 17:38:17 executing program 1: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 17:38:17 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) [ 668.218512] IPVS: ftp: loaded support on port[0] = 21 17:38:17 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r1 = dup2(r0, r0) sendto$inet6(r1, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 17:38:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:17 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r1 = dup2(r0, r0) sendto$inet6(r1, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000000c0)) 17:38:17 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 17:38:17 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r1 = dup2(r0, r0) sendto$inet6(r1, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:19 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) r1 = dup(r0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x170) fcntl$getown(r1, 0x9) 17:38:19 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 17:38:19 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 17:38:19 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:19 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a00000200000000000000dacbdca1"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000500)=@xdp, 0x80, 0x0, 0x0, &(0x7f00000007c0)=""/156, 0x9c}}, {{&(0x7f0000000880)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/4096, 0x1000}, 0x7}], 0x2, 0x8000000000, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 17:38:19 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @link_local, [], {@arp={0x806, @ether_ipv4={0x1, 0x500, 0x6, 0x4, 0x0, @empty, @empty, @remote}}}}, 0x0) [ 671.025227] IPVS: ftp: loaded support on port[0] = 21 17:38:19 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:19 executing program 1: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 17:38:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:20 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/17, 0x11) 17:38:20 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:20 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) r2 = dup3(r1, r0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) 17:38:20 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) [ 672.010609] IPVS: ftp: loaded support on port[0] = 21 17:38:21 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a00000200000000000000dacbdca1"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000500)=@xdp, 0x80, 0x0, 0x0, &(0x7f00000007c0)=""/156, 0x9c}}, {{&(0x7f0000000880)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/4096, 0x1000}, 0x7}], 0x2, 0x8000000000, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 17:38:21 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:21 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:21 executing program 1: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000015, &(0x7f0000000000)=0x76, 0x9e) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f00000000c0)) 17:38:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:21 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:21 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:21 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) [ 672.812536] IPVS: ftp: loaded support on port[0] = 21 17:38:21 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:22 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a00000200000000000000dacbdca1"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000500)=@xdp, 0x80, 0x0, 0x0, &(0x7f00000007c0)=""/156, 0x9c}}, {{&(0x7f0000000880)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/4096, 0x1000}, 0x7}], 0x2, 0x8000000000, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 17:38:22 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:22 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:22 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x0) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:22 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:22 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 673.762972] IPVS: ftp: loaded support on port[0] = 21 17:38:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:22 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:23 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a00000200000000000000dacbdca1"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000500)=@xdp, 0x80, 0x0, 0x0, &(0x7f00000007c0)=""/156, 0x9c}}, {{&(0x7f0000000880)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/4096, 0x1000}, 0x7}], 0x2, 0x8000000000, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 17:38:23 executing program 5: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:23 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x0) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:23 executing program 5: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:23 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) [ 674.697273] IPVS: ftp: loaded support on port[0] = 21 17:38:23 executing program 5: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:23 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:24 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a00000200000000000000dacbdca1"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000500)=@xdp, 0x80, 0x0, 0x0, &(0x7f00000007c0)=""/156, 0x9c}}, {{&(0x7f0000000880)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/4096, 0x1000}, 0x7}], 0x2, 0x8000000000, 0x0) 17:38:24 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:24 executing program 5: r0 = syz_open_dev$mice(0x0, 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x0) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:24 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) [ 675.707855] IPVS: ftp: loaded support on port[0] = 21 17:38:24 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:24 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:24 executing program 5: r0 = syz_open_dev$mice(0x0, 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:25 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:25 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a00000200000000000000dacbdca1"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000500)=@xdp, 0x80, 0x0, 0x0, &(0x7f00000007c0)=""/156, 0x9c}}, {{&(0x7f0000000880)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)=""/4096, 0x1000}, 0x7}], 0x2, 0x8000000000, 0x0) 17:38:25 executing program 5: r0 = syz_open_dev$mice(0x0, 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(0xffffffffffffffff, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:25 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:25 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:25 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:25 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 676.786750] IPVS: ftp: loaded support on port[0] = 21 17:38:25 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:25 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:25 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:26 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020a00000200000000000000dacbdca1"], 0x10}}, 0x0) 17:38:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:26 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:26 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(0xffffffffffffffff, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:26 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:26 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 677.763559] IPVS: ftp: loaded support on port[0] = 21 17:38:26 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:26 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:27 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:27 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffca}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 17:38:27 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(0xffffffffffffffff, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:27 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:27 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) [ 678.686863] protocol 88fb is buggy, dev hsr_slave_0 [ 678.692074] protocol 88fb is buggy, dev hsr_slave_1 [ 678.787306] IPVS: ftp: loaded support on port[0] = 21 17:38:27 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:28 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 17:38:28 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x0, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:28 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000004000004c9e0004000200aa0802000000000000000000000105000600200010000a00000000000000000500e50000070000001f0000000000002500234e0000000200010000000000000000020000627c05000500000000000a00000000000000ff170000d18e7b81ce4a5aded7d42781c786000000000000"], 0x80}}, 0x0) 17:38:28 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x10, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) [ 679.566851] protocol 88fb is buggy, dev hsr_slave_0 [ 679.571980] protocol 88fb is buggy, dev hsr_slave_1 [ 679.577212] protocol 88fb is buggy, dev hsr_slave_0 [ 679.582308] protocol 88fb is buggy, dev hsr_slave_1 [ 679.587705] protocol 88fb is buggy, dev hsr_slave_0 [ 679.592804] protocol 88fb is buggy, dev hsr_slave_1 17:38:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) [ 679.681197] IPVS: ftp: loaded support on port[0] = 21 17:38:28 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x10, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:28 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:28 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 17:38:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x0, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) [ 680.271852] IPVS: ftp: loaded support on port[0] = 21 17:38:29 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:29 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x10, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) 17:38:29 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:29 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 17:38:29 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) 17:38:29 executing program 4: unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 17:38:29 executing program 5: syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x0, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) 17:38:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) [ 681.236851] IPVS: ftp: loaded support on port[0] = 21 17:38:30 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:30 executing program 4: unshare(0x24020400) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 17:38:30 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:30 executing program 5: syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) 17:38:30 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:30 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000001200)=0x9b5, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000001900)={'bpq0\x00'}) 17:38:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:30 executing program 5: syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) 17:38:30 executing program 4: execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) [ 681.886841] protocol 88fb is buggy, dev hsr_slave_0 [ 681.892103] protocol 88fb is buggy, dev hsr_slave_1 17:38:30 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:31 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) [ 682.199652] IPVS: ftp: loaded support on port[0] = 21 17:38:31 executing program 4: execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 17:38:31 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:31 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) 17:38:31 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:31 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:31 executing program 4: execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 17:38:31 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) 17:38:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:31 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:31 executing program 4: unshare(0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 17:38:31 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:32 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x28002) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, 0x0, 0x0) [ 683.115474] IPVS: ftp: loaded support on port[0] = 21 17:38:32 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:32 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:32 executing program 4: unshare(0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 17:38:32 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:32 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:32 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:32 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:32 executing program 4: unshare(0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 17:38:32 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:32 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:32 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) [ 683.966804] protocol 88fb is buggy, dev hsr_slave_0 [ 683.971927] protocol 88fb is buggy, dev hsr_slave_1 [ 684.023348] IPVS: ftp: loaded support on port[0] = 21 17:38:32 executing program 4: unshare(0x24020400) execve(0x0, 0x0, 0x0) 17:38:33 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:33 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:33 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:33 executing program 4: unshare(0x24020400) execve(0x0, 0x0, 0x0) 17:38:33 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) [ 684.366814] protocol 88fb is buggy, dev hsr_slave_0 [ 684.371940] protocol 88fb is buggy, dev hsr_slave_1 17:38:33 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 17:38:33 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:33 executing program 4: unshare(0x24020400) execve(0x0, 0x0, 0x0) [ 684.652816] IPVS: ftp: loaded support on port[0] = 21 17:38:33 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:33 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:33 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 17:38:34 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x2000000001100) close(r2) read$FUSE(r1, &(0x7f00000015c0), 0x3a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) open$dir(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) 17:38:34 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:34 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:34 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:34 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 685.658109] IPVS: ftp: loaded support on port[0] = 21 17:38:34 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:34 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x2000000001100) close(r2) read$FUSE(r1, &(0x7f00000015c0), 0x3a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) open$dir(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) 17:38:34 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 17:38:34 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) bind$packet(r0, 0x0, 0x0) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:35 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) bind$packet(r0, 0x0, 0x0) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:35 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4c801) 17:38:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:35 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:35 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:35 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x2000000001100) close(r2) read$FUSE(r1, &(0x7f00000015c0), 0x3a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) open$dir(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) [ 686.446925] protocol 88fb is buggy, dev hsr_slave_0 [ 686.452052] protocol 88fb is buggy, dev hsr_slave_1 17:38:35 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:38:35 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x2000000001100) close(r2) read$FUSE(r1, &(0x7f00000015c0), 0x3a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) open$dir(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) [ 686.602345] IPVS: ftp: loaded support on port[0] = 21 17:38:35 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) bind$packet(r0, 0x0, 0x0) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:35 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:35 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:38:36 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:36 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:38:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(0x0, 0x0, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:36 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:36 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:36 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x2000000001100) close(r2) read$FUSE(r1, &(0x7f00000015c0), 0x3a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) open$dir(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) [ 687.488693] IPVS: ftp: loaded support on port[0] = 21 17:38:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000001c0)) 17:38:36 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 17:38:36 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) [ 688.121130] protocol 88fb is buggy, dev hsr_slave_0 [ 688.126271] protocol 88fb is buggy, dev hsr_slave_1 [ 688.126834] protocol 88fb is buggy, dev hsr_slave_0 [ 688.131439] protocol 88fb is buggy, dev hsr_slave_0 17:38:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(0x0, 0x0, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000001c0)) 17:38:37 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:37 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x8}, 0xc) 17:38:37 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000001c0)) [ 688.473051] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 688.500492] IPVS: ftp: loaded support on port[0] = 21 17:38:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, 0x0) 17:38:37 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:37 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x0, 0x7fd, 0x0, &(0x7f0000001a80)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) 17:38:37 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:37 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:37 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(0x0, 0x0, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:37 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) 17:38:37 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:38 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) 17:38:38 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) [ 689.388851] IPVS: ftp: loaded support on port[0] = 21 17:38:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, 0x0) 17:38:38 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:38 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:38 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:38 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) 17:38:38 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = dup2(r0, r0) sendto$inet6(r2, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, 0x0) 17:38:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:38 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:38 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(0xffffffffffffffff, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:38 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) 17:38:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, 0x0) 17:38:39 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(0xffffffffffffffff, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:39 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) [ 690.350552] IPVS: ftp: loaded support on port[0] = 21 17:38:39 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r3) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, 0x0) 17:38:39 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(0xffffffffffffffff, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:39 executing program 5: socket$kcm(0x11, 0x3, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) 17:38:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:39 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000480), 0x4) 17:38:39 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, 0xffffffffffffffff) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:39 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) [ 691.154782] IPVS: ftp: loaded support on port[0] = 21 17:38:40 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) 17:38:40 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, 0xffffffffffffffff) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:40 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:40 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:40 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) 17:38:40 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, 0xffffffffffffffff) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:40 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:40 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) [ 692.003090] IPVS: ftp: loaded support on port[0] = 21 17:38:40 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) dup2(r0, r0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:41 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 692.109156] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:41 executing program 0: socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:41 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) dup2(r0, r0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:41 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:41 executing program 0: socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:41 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) dup2(r0, r0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9fb3780d88d5375000001000000301e", 0x3c, 0x0, 0x0, 0x0) 17:38:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {0xffffffffffffffff, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:41 executing program 0: socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:41 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) [ 693.002458] IPVS: ftp: loaded support on port[0] = 21 17:38:42 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 693.129192] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:42 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:42 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 17:38:42 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 17:38:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 693.631506] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:42 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 17:38:42 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 17:38:42 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 693.938557] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {0xffffffffffffffff, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:44 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:44 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:44 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) 17:38:44 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:44 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 695.998252] IPVS: ftp: loaded support on port[0] = 21 17:38:44 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) 17:38:45 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:45 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) 17:38:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {0xffffffffffffffff, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:45 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:45 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:45 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) [ 696.846788] net_ratelimit: 6 callbacks suppressed [ 696.846797] protocol 88fb is buggy, dev hsr_slave_0 [ 696.856838] protocol 88fb is buggy, dev hsr_slave_1 [ 696.919837] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 696.983969] IPVS: ftp: loaded support on port[0] = 21 17:38:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:45 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e337", 0x1e, 0x0, 0x0, 0x0) 17:38:46 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:46 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e337", 0x1e, 0x0, 0x0, 0x0) [ 697.303004] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:46 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140cebdf", 0x12}], 0x1}, 0x0) 17:38:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:46 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e337", 0x1e, 0x0, 0x0, 0x0) [ 697.709154] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 697.975944] IPVS: ftp: loaded support on port[0] = 21 17:38:47 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) 17:38:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, 0x0}, 0x0) 17:38:47 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:47 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9", 0x2d, 0x0, 0x0, 0x0) [ 698.320869] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, 0x0}, 0x0) 17:38:47 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:47 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207d9", 0x2d, 0x0, 0x0, 0x0) 17:38:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:47 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, 0x0}, 0x0) [ 698.709333] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:47 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e337", 0x1e, 0x0, 0x0, 0x0) [ 698.920461] IPVS: ftp: loaded support on port[0] = 21 17:38:47 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 699.306251] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:48 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) 17:38:48 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80}, 0x0) 17:38:48 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:48 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e337", 0x1e, 0x0, 0x0, 0x0) 17:38:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:48 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:48 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80}, 0x0) [ 699.732158] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 699.779010] IPVS: ftp: loaded support on port[0] = 21 17:38:48 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e337", 0x1e, 0x0, 0x0, 0x0) 17:38:48 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80}, 0x0) 17:38:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 17:38:49 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7", 0x26, 0x0, 0x0, 0x0) [ 700.294554] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:49 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) 17:38:49 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 17:38:49 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7", 0x26, 0x0, 0x0, 0x0) [ 700.687524] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 700.765972] IPVS: ftp: loaded support on port[0] = 21 17:38:49 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 17:38:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:49 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7", 0x26, 0x0, 0x0, 0x0) 17:38:50 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:38:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) [ 701.281483] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 701.583486] IPVS: ftp: loaded support on port[0] = 21 17:38:50 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:50 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a769950793", 0x2a, 0x0, 0x0, 0x0) 17:38:50 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:50 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:38:50 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a769950793", 0x2a, 0x0, 0x0, 0x0) 17:38:50 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 17:38:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 702.137768] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:51 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a769950793", 0x2a, 0x0, 0x0, 0x0) [ 702.458246] IPVS: ftp: loaded support on port[0] = 21 17:38:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:51 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000", 0x9}], 0x1}, 0x0) 17:38:51 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a7699507938207", 0x2c, 0x0, 0x0, 0x0) [ 702.839819] nla_parse: 1 callbacks suppressed [ 702.839830] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:51 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000", 0x9}], 0x1}, 0x0) 17:38:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {0xffffffffffffffff, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:51 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:51 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 703.086830] protocol 88fb is buggy, dev hsr_slave_0 [ 703.091956] protocol 88fb is buggy, dev hsr_slave_1 17:38:52 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000", 0x9}], 0x1}, 0x0) 17:38:52 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a76995079382", 0x2b, 0x0, 0x0, 0x0) [ 703.226143] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 703.435962] IPVS: ftp: loaded support on port[0] = 21 17:38:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:52 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14", 0xe}], 0x1}, 0x0) [ 703.497013] audit: type=1800 audit(1554917932.252:73): pid=15841 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17186 res=0 17:38:52 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a76995079382", 0x2b, 0x0, 0x0, 0x0) [ 703.761077] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:52 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:52 executing program 3: r0 = socket$packet(0x11, 0x40800000000003, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x80, 0x1f8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = dup2(r0, r0) sendto$inet6(r3, &(0x7f00000002c0)="020400000300603900382b8a5b5aa242b90516db4d23a3bb09f82632e33715d26206cd6b80a76995079382", 0x2b, 0x0, 0x0, 0x0) 17:38:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {0xffffffffffffffff, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:53 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 704.140221] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:53 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14", 0xe}], 0x1}, 0x0) 17:38:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 704.431011] IPVS: ftp: loaded support on port[0] = 21 17:38:53 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14", 0xe}], 0x1}, 0x0) [ 704.688685] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:53 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 704.833274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:38:53 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140c", 0x10}], 0x1}, 0x0) 17:38:53 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140c", 0x10}], 0x1}, 0x0) 17:38:54 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140c", 0x10}], 0x1}, 0x0) 17:38:54 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140ceb", 0x11}], 0x1}, 0x0) [ 705.593862] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {0xffffffffffffffff, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:56 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:56 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140c", 0x10}], 0x1}, 0x0) 17:38:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:38:56 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:56 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140c", 0x10}], 0x1}, 0x0) 17:38:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:57 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="9e4301000080600000001fe4ac14140c", 0x10}], 0x1}, 0x0) [ 708.090407] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 708.099732] IPVS: ftp: loaded support on port[0] = 21 [ 708.113183] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:38:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:38:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500022881001f00000500000800080008000400ff7e280000001100ffffba16a0aa1c0900000040000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 708.405296] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 708.439090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:38:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) [ 708.678619] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:57 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:38:57 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:38:57 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 709.062598] IPVS: ftp: loaded support on port[0] = 21 [ 709.273618] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 709.297279] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:38:58 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:38:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:38:58 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 709.711756] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 710.022514] IPVS: ftp: loaded support on port[0] = 21 17:38:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 710.105408] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:59 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:38:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:38:59 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca865", 0x39}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) [ 710.667568] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 17:38:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:38:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 710.857197] IPVS: ftp: loaded support on port[0] = 21 17:38:59 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:38:59 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca865", 0x39}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:38:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:39:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:00 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:39:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:00 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca865", 0x39}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) [ 711.729805] IPVS: ftp: loaded support on port[0] = 21 17:39:01 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:01 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:01 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1", 0x43}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:39:01 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:39:01 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:01 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 712.644216] IPVS: ftp: loaded support on port[0] = 21 17:39:01 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1", 0x43}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:01 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:39:02 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:39:02 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1", 0x43}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) [ 713.396335] nla_parse: 12 callbacks suppressed [ 713.396352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:02 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560b3", 0x2e}], 0x1}, 0x0) 17:39:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 713.576907] IPVS: ftp: loaded support on port[0] = 21 17:39:02 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c", 0x48}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) [ 713.853717] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) [ 714.193664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:03 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {0xffffffffffffffff, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:03 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c", 0x48}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 714.425110] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) [ 714.608317] IPVS: ftp: loaded support on port[0] = 21 17:39:03 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:03 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c", 0x48}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 714.998985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:39:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {0xffffffffffffffff, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) [ 715.259969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:04 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac4", 0x4a}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:04 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 715.585176] IPVS: ftp: loaded support on port[0] = 21 17:39:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 17:39:04 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac4", 0x4a}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 716.122606] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 17:39:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {0xffffffffffffffff, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:05 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 716.292469] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:05 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac4", 0x4a}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 716.511395] IPVS: ftp: loaded support on port[0] = 21 17:39:05 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) [ 716.743637] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 17:39:05 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b", 0x4b}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:05 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) [ 717.219055] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 717.396507] IPVS: ftp: loaded support on port[0] = 21 17:39:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 17:39:06 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b", 0x4b}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:06 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:06 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 17:39:06 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b", 0x4b}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1}, 0x0) 17:39:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 718.494733] nla_parse: 3 callbacks suppressed [ 718.494744] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 718.503381] IPVS: ftp: loaded support on port[0] = 21 17:39:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1}, 0x0) 17:39:07 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:07 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:07 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)}], 0x1}, 0x0) 17:39:07 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 719.040163] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b", 0x17}], 0x1}, 0x0) [ 719.247905] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:08 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 719.495762] IPVS: ftp: loaded support on port[0] = 21 17:39:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b", 0x17}], 0x1}, 0x0) 17:39:08 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 719.681561] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 17:39:08 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:09 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b", 0x17}], 0x1}, 0x0) 17:39:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:09 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:09 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e", 0x23}], 0x1}, 0x0) [ 720.560105] IPVS: ftp: loaded support on port[0] = 21 17:39:09 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e", 0x23}], 0x1}, 0x0) 17:39:09 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:10 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e", 0x23}], 0x1}, 0x0) 17:39:10 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:10 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab", 0x29}], 0x1}, 0x0) 17:39:10 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) [ 721.404348] IPVS: ftp: loaded support on port[0] = 21 17:39:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab", 0x29}], 0x1}, 0x0) 17:39:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:39:10 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86'}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab", 0x29}], 0x1}, 0x0) 17:39:11 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86'}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) [ 722.344604] IPVS: ftp: loaded support on port[0] = 21 17:39:11 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:11 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab145655", 0x2c}], 0x1}, 0x0) 17:39:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) 17:39:11 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86'}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {0xffffffffffffffff, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab145655", 0x2c}], 0x1}, 0x0) 17:39:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) [ 723.119027] IPVS: ftp: loaded support on port[0] = 21 17:39:12 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab145655", 0x2c}], 0x1}, 0x0) 17:39:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 17:39:12 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560", 0x2d}], 0x1}, 0x0) 17:39:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {0xffffffffffffffff, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 17:39:12 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560", 0x2d}], 0x1}, 0x0) 17:39:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 724.118544] IPVS: ftp: loaded support on port[0] = 21 17:39:13 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:13 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(0xffffffffffffffff, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 17:39:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810f622fffe5221ed4c419606b481f000b000000d41266fb120009000e00037363f6ab14565560", 0x2d}], 0x1}, 0x0) 17:39:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 17:39:13 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 17:39:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {0xffffffffffffffff, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:13 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) 17:39:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) fchmod(r0, 0x0) 17:39:13 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 725.232754] IPVS: ftp: loaded support on port[0] = 21 17:39:14 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x30) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) accept4$inet6(r2, 0x0, &(0x7f0000000080), 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 17:39:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 17:39:14 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:14 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) 17:39:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 726.083317] IPVS: ftp: loaded support on port[0] = 21 17:39:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 17:39:15 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) 17:39:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:15 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) 17:39:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) 17:39:15 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x0, 0x0) 17:39:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) [ 726.843588] IPVS: ftp: loaded support on port[0] = 21 17:39:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) 17:39:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:16 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:16 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e2800", 0x26}], 0x1}, 0x0) 17:39:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e2800", 0x26}], 0x1}, 0x0) [ 727.584185] IPVS: ftp: loaded support on port[0] = 21 17:39:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e2800", 0x26}], 0x1}, 0x0) 17:39:16 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x0, 0x0) 17:39:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 17:39:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) [ 728.222291] IPVS: ftp: loaded support on port[0] = 21 17:39:17 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:17 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) [ 728.587398] audit: type=1800 audit(1554917957.432:74): pid=17421 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17799 res=0 17:39:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 17:39:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:17 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) [ 728.990451] audit: type=1800 audit(1554917957.842:75): pid=17439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17804 res=0 [ 729.204072] IPVS: ftp: loaded support on port[0] = 21 17:39:18 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c7c59422a755ca86550cb0f7cdfe469e930b1cc7e63975c0ac47b62", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d802}) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000022a, 0x0, 0x0) 17:39:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 17:39:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:18 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:18 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 729.705001] audit: type=1800 audit(1554917958.512:76): pid=17453 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16536 res=0 17:39:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 17:39:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) [ 730.148263] IPVS: ftp: loaded support on port[0] = 21 17:39:19 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:19 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 17:39:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {0xffffffffffffffff, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:19 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 731.111588] IPVS: ftp: loaded support on port[0] = 21 17:39:20 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(0xffffffffffffffff, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x408001) fallocate(0xffffffffffffffff, 0x3, 0x0, 0xfff9) 17:39:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 17:39:20 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(0xffffffffffffffff, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x408001) fallocate(0xffffffffffffffff, 0x3, 0x0, 0xfff9) 17:39:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {0xffffffffffffffff, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 17:39:20 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 732.054302] IPVS: ftp: loaded support on port[0] = 21 17:39:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(0xffffffffffffffff, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x408001) fallocate(0xffffffffffffffff, 0x3, 0x0, 0xfff9) 17:39:21 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 17:39:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {0xffffffffffffffff, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:21 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:21 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 733.019855] IPVS: ftp: loaded support on port[0] = 21 17:39:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 17:39:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 17:39:22 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 17:39:22 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:22 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:24 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:24 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 17:39:24 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:24 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:24 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000480007041dfffd946f6105000a0000001f00000000000800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) [ 735.698656] IPVS: ftp: loaded support on port[0] = 21 17:39:24 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:25 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) [ 736.564563] IPVS: ftp: loaded support on port[0] = 21 17:39:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:25 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:26 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 737.409413] IPVS: ftp: loaded support on port[0] = 21 17:39:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:26 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:26 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:26 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) [ 738.177016] IPVS: ftp: loaded support on port[0] = 21 17:39:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:27 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:27 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 739.103318] IPVS: ftp: loaded support on port[0] = 21 17:39:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:28 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r0, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r0, 0x3, 0x0, 0x408001) fallocate(r0, 0x3, 0x0, 0xfff9) 17:39:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x5, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:28 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:28 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 740.020533] IPVS: ftp: loaded support on port[0] = 21 17:39:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:29 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:29 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{0xffffffffffffffff, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 740.899955] IPVS: ftp: loaded support on port[0] = 21 17:39:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:29 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:30 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:30 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{0xffffffffffffffff, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) [ 741.481560] IPVS: ftp: loaded support on port[0] = 21 17:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:30 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{0xffffffffffffffff, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) [ 742.310549] IPVS: ftp: loaded support on port[0] = 21 17:39:31 executing program 1: unshare(0x8000400) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:31 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:31 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) [ 743.125167] IPVS: ftp: loaded support on port[0] = 21 17:39:32 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:32 executing program 1: unshare(0x8000400) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:32 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 743.896116] IPVS: ftp: loaded support on port[0] = 21 17:39:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:33 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 744.239545] IPVS: ftp: loaded support on port[0] = 21 17:39:33 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:33 executing program 1: unshare(0x8000400) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(0xffffffffffffffff, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) [ 744.823501] IPVS: ftp: loaded support on port[0] = 21 17:39:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:33 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(0xffffffffffffffff, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r0) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(0xffffffffffffffff, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 745.629302] IPVS: ftp: loaded support on port[0] = 21 17:39:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, 0x0, 0x0) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x40000000) 17:39:35 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, 0x0, 0x0) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 746.555930] IPVS: ftp: loaded support on port[0] = 21 17:39:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, 0x0, 0x0) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) unshare(0x40000000) 17:39:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 747.536872] IPVS: ftp: loaded support on port[0] = 21 17:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:36 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) unshare(0x40000000) 17:39:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x0, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 748.341938] IPVS: ftp: loaded support on port[0] = 21 17:39:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x0, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:37 executing program 1: unshare(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:37 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) unshare(0x40000000) 17:39:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x0, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 749.272684] IPVS: ftp: loaded support on port[0] = 21 17:39:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:38 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:38 executing program 1: unshare(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) unshare(0x40000000) 17:39:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) 17:39:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 750.151412] IPVS: ftp: loaded support on port[0] = 21 17:39:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(0xffffffffffffffff, 0x3, 0x0, 0xfff9) 17:39:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) unshare(0x40000000) 17:39:39 executing program 1: unshare(0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:39 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(0xffffffffffffffff, 0x3, 0x0, 0xfff9) 17:39:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 751.219994] IPVS: ftp: loaded support on port[0] = 21 17:39:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(0xffffffffffffffff, 0x3, 0x0, 0xfff9) 17:39:40 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) unshare(0x40000000) 17:39:40 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x0, 0x0, 0xfff9) 17:39:40 executing program 1: unshare(0x8000400) mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x0, 0x0, 0xfff9) [ 752.109324] IPVS: ftp: loaded support on port[0] = 21 17:39:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x0, 0x0, 0xfff9) 17:39:41 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x0) 17:39:41 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0x0) 17:39:41 executing program 1: unshare(0x8000400) mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x0) 17:39:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0x0) 17:39:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)=0x9) write$cgroup_type(r1, &(0x7f0000007a40)='threaded\x00', 0x9) fallocate(r1, 0x3, 0x0, 0x408001) fallocate(r1, 0x3, 0x0, 0x0) 17:39:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'teamW\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)={0x1, 0x401, 0x4, 0x2, 0x3, [{0x8, 0x3, 0x200, 0x0, 0x0, 0x2000}, {0x8, 0x8000, 0x3ff, 0x0, 0x0, 0xe00}, {0x2, 0x8, 0x0, 0x0, 0x0, 0x908}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) r8 = fcntl$dupfd(r3, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) poll(&(0x7f0000000500)=[{r0, 0x10}, {r7, 0x1180}, {r3, 0x40}, {r8, 0x4}, {r0, 0x8000}, {r4, 0x424}], 0x6, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) unshare(0x0) 17:39:42 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 753.763592] Dead loop on virtual device ip6_vti0, fix it urgently! [ 753.796741] Dead loop on virtual device ip6_vti0, fix it urgently! [ 753.824275] Dead loop on virtual device ip6_vti0, fix it urgently! [ 753.879110] Dead loop on virtual device ip6_vti0, fix it urgently! [ 753.895268] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:42 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:42 executing program 4: r0 = socket$inet(0x2, 0x803, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:39:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x10}], 0x10}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:42 executing program 1: unshare(0x8000400) mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 753.921549] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x30}}, 0x0) 17:39:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x10}], 0x10}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x10}], 0x10}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 754.370666] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 754.393586] device bridge_slave_0 left promiscuous mode [ 754.419153] bridge0: port 1(bridge_slave_0) entered disabled state 17:39:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:43 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 754.540477] device bridge_slave_1 left promiscuous mode [ 754.580297] bridge0: port 2(bridge_slave_1) entered disabled state [ 754.642137] bond0: Releasing backup interface bond_slave_0 17:39:43 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 754.761089] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:43 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:44 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:44 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 755.762588] bond0: Releasing backup interface bond_slave_1 [ 755.850630] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:44 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 756.742130] team0: Port device team_slave_0 removed 17:39:45 executing program 4: ppoll(&(0x7f0000000480)=[{}], 0x1, &(0x7f00000004c0), 0x0, 0xffffffffffffff26) [ 756.908039] team0: Port device team_slave_1 removed 17:39:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:45 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(0xffffffffffffffff, 0x3, 0xffffffffffffffff) 17:39:45 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:45 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x05\x00\x00\x00\x00\x00\x00\x00x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x0) 17:39:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:46 executing program 4: r0 = socket(0x18, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040), 0x8) 17:39:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="240000001d0007041dfffd946f6105000700000402000000000002000800a3a20400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 757.637357] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 17:39:46 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(0xffffffffffffffff, 0x3, 0xffffffffffffffff) 17:39:46 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:46 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 758.219764] Dead loop on virtual device ip6_vti0, fix it urgently! [ 758.260044] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:47 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r2, r2, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(0xffffffffffffffff, 0x3, 0xffffffffffffffff) 17:39:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:47 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 758.842925] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:47 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, 0x0, 0x0) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:48 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, 0x0, 0x0) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) [ 759.759624] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:48 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:48 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 17:39:48 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:48 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, 0x0, 0x0) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:49 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:49 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:49 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:49 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:49 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:49 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(0x0, 0x0, 0x0) 17:39:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:49 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:50 executing program 4: socket$packet(0x11, 0x2, 0x300) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:50 executing program 4: socket$packet(0x11, 0x2, 0x300) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:50 executing program 4: socket$packet(0x11, 0x2, 0x300) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:50 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, 0x0, 0x0, 0x0) 17:39:51 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:51 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(0x0, 0x0, 0x0) 17:39:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, 0x0, 0x0, 0x0) 17:39:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(0xffffffffffffffff) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, 0x0, 0x0, 0x0) 17:39:51 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}], 0x1, 0x0) 17:39:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}], 0x1, 0x0) 17:39:51 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:51 executing program 1: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, 0x0) exit(0x0) mknod(0x0, 0x0, 0x0) 17:39:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}], 0x1, 0x0) 17:39:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:52 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 17:39:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 17:39:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, 0x0, 0x0) 17:39:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 763.470424] Dead loop on virtual device ip6_vti0, fix it urgently! [ 763.509217] Dead loop on virtual device ip6_vti0, fix it urgently! [ 763.528585] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 17:39:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x1, 0x0) 17:39:52 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:52 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, 0x0, 0x0) 17:39:52 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x1, 0x0) 17:39:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) [ 763.959428] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x1, 0x0) 17:39:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, 0x0, 0x0) 17:39:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:53 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 17:39:53 executing program 5: execve(0x0, 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 17:39:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) close(r1) connect$unix(r2, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 17:39:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 765.086867] protocol 88fb is buggy, dev hsr_slave_0 [ 765.092023] protocol 88fb is buggy, dev hsr_slave_1 [ 765.096833] protocol 88fb is buggy, dev hsr_slave_0 [ 765.097221] protocol 88fb is buggy, dev hsr_slave_0 [ 765.102139] protocol 88fb is buggy, dev hsr_slave_1 [ 765.107191] protocol 88fb is buggy, dev hsr_slave_1 [ 765.117355] protocol 88fb is buggy, dev hsr_slave_0 [ 765.122543] protocol 88fb is buggy, dev hsr_slave_1 17:39:54 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r8 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r8, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) r9 = socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r10 = getpid() r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r12 = openat$cgroup(r11, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r13 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r10, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) r14 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r12, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r13, 0x2403, 0x0) openat$cgroup_int(r11, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2003f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x40082404, &(0x7f00000001c0)=0x5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)={r7}) 17:39:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_buf(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:54 executing program 5: execve(0x0, 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 765.500095] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:54 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r8 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r8, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) r9 = socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r10 = getpid() r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r12 = openat$cgroup(r11, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r13 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r10, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) r14 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r12, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r13, 0x2403, 0x0) openat$cgroup_int(r11, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2003f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x40082404, &(0x7f00000001c0)=0x5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)={r7}) 17:39:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm, 0x80, 0x0}}, {{&(0x7f0000000000)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 17:39:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_buf(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_buf(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:54 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/rfkill\x00', 0x189080, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x210000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000001c0)={0x0, 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x3, {0xfff, 0x100, "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", 0x65, 0x800, 0x0, 0x3, 0xea43, 0x7e8, 0x3, 0x1}, r2}}, 0x128) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000280)={0x0, 0x2}) ioprio_set$uid(0x0, 0x0, 0x5902) io_setup(0x200, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f00000009c0)=[&(0x7f0000000980)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000880)="8c7111", 0x3, 0xdbe}]) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00\x01\x00\x00p\xfc\xc9\x98\xb0kk\xbd\xfd\x10'}}, 0x1e) ioctl$EVIOCGBITSW(r1, 0x80404525, 0x0) timer_create(0x5, &(0x7f0000000080)={0x0, 0x14, 0x5, @tid=0xffffffffffffffff}, &(0x7f00000002c0)=0x0) timer_getoverrun(r4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="044daf191b47764c463003e3ec9f681b9d420070ef060000000030abd5edff41e10ddf37025db9f702ae914ae82d8769205d0f0812c47e983aa35c9be181b9037c59b08287d03d649c0d0bcb90e567535c80c80211634a254eff234470c45e2e11968087f18647c44835f45ea3590640648776f0a0667419d8badbc720112da1f7b190"], 0x83) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x0, 0x2710}}, 0x100) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @multicast2}, 0x10) 17:39:54 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r8 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r8, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) r9 = socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r10 = getpid() r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r12 = openat$cgroup(r11, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r13 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r10, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) r14 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r12, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r13, 0x2403, 0x0) openat$cgroup_int(r11, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2003f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x40082404, &(0x7f00000001c0)=0x5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)={r7}) 17:39:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 766.014757] cgroup: fork rejected by pids controller in /syz4 17:39:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:55 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r8 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r8, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) r9 = socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r10 = getpid() r11 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r12 = openat$cgroup(r11, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r13 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r10, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) r14 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r12, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r13, 0x2403, 0x0) openat$cgroup_int(r11, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2003f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x40082404, &(0x7f00000001c0)=0x5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000000)={r7}) 17:39:55 executing program 5: execve(0x0, 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', &(0x7f0000000380)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:55 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 17:39:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_pts(r0, 0x1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000e80), 0x20) 17:39:55 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r10 = openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r11 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) r12 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r10, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r11, 0x2403, 0x0) openat$cgroup_int(r9, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2003f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x40082404, &(0x7f00000001c0)=0x5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x2}, 0x14) 17:39:55 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:55 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r10 = openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r11 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) r12 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r10, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r11, 0x2403, 0x0) openat$cgroup_int(r9, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2003f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x40082404, &(0x7f00000001c0)=0x5) 17:39:56 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:56 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:56 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r10 = openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r11 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r10, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r11, 0x2403, 0x0) openat$cgroup_int(r9, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2003f, 0x0) 17:39:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:56 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:56 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:56 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r10 = openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r11 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r10, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r11, 0x2403, 0x0) openat$cgroup_int(r9, &(0x7f00000002c0)='memory.max\x00', 0x2, 0x0) 17:39:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:56 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r10 = openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) r11 = perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r10, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_RESET(r11, 0x2403, 0x0) 17:39:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:57 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 17:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:57 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r10 = openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r10, 0x9, 0xffffffffffffffff, 0x8) socket$kcm(0x29, 0x7, 0x0) 17:39:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:57 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:57 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r10 = openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x3, 0x68, 0x6, 0x3, 0x0, 0xffff, 0x82154, 0x3, 0x6, 0xfffffffffffffffc, 0xfff, 0x0, 0x9, 0x8, 0x0, 0x1, 0x6, 0xffff, 0x8000, 0x82e, 0xfffffffffffffff7, 0x83, 0x20, 0x5, 0x0, 0xb0, 0xe8, 0x3, 0x35, 0xffffffffffffffff, 0x7f, 0x2, 0x4, 0x1, 0x8, 0x5, 0x0, 0x9, 0x6, @perf_config_ext={0x2dc, 0x43d}, 0x4, 0x3, 0x2, 0x2, 0x3, 0x1200, 0x1}, r10, 0x9, 0xffffffffffffffff, 0x8) 17:39:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:57 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:39:57 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r6, 0xfffffdc8, &(0x7f00000006c0)}, 0x10) 17:39:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:57 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:58 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x9, 0x10}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r5, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r7, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r8 = getpid() r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) openat$cgroup(r9, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r8, 0x0, 0xffffffffffffffff, 0xb) close(r6) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) 17:39:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:39:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:58 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r6, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r7 = getpid() r8 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) openat$cgroup(r8, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r7, 0x0, 0xffffffffffffffff, 0xb) close(r5) 17:39:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:39:58 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) r6 = getpid() r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) openat$cgroup(r7, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x4, 0x401, 0x9ac6, 0x6, 0x0, 0xe35b, 0x10, 0x9, 0x8c32, 0x81, 0x80000001f93, 0x3ff, 0x3, 0x5, 0x1d, 0x2, 0x7c08, 0x5, 0x910d, 0x80, 0x1, 0xfffffffffffffd2f, 0xffffffffffff0000, 0xfffffffffffff800, 0x2, 0x3f, 0x100000, 0x3, 0x2c780000000, 0x5, 0x9, 0x9, 0x10000, 0x7fffffff, 0x8000, 0x81, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000500), 0x2}, 0x200, 0x7, 0x80, 0x2, 0x7f, 0x401, 0x5}, r6, 0x0, 0xffffffffffffffff, 0xb) 17:39:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) [ 769.845722] net_ratelimit: 4 callbacks suppressed [ 769.845730] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:58 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) 17:39:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:58 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) getpid() r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) openat$cgroup(r6, &(0x7f0000000680)='syz1\x00', 0x200002, 0x0) 17:39:58 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) 17:39:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:39:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:59 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:59 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) getpid() openat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) 17:39:59 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) 17:39:59 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:39:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x18, 0x0, &(0x7f00000000c0)) 17:39:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:59 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:39:59 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) getpid() [ 770.767000] Dead loop on virtual device ip6_vti0, fix it urgently! 17:39:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:39:59 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x100, 0x0) 17:40:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:40:00 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:40:00 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2c, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 17:40:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:40:00 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) socket$kcm(0xa, 0x2, 0x0) 17:40:00 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:40:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:40:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4002) io_setup(0x8, &(0x7f0000000080)=0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) r5 = getpgrp(r4) rt_tgsigqueueinfo(r4, r5, 0x3a, &(0x7f0000000300)={0x0, 0x48af, 0x4}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 17:40:00 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0xfffffea7, &(0x7f0000000480)}, 0xffffffffffffffdd) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) 17:40:00 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00']) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 17:40:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:40:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:40:00 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:40:00 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffe, 0xfffffffffffffcb9) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) 17:40:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x100000000000a, 0x300) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0xe}}) 17:40:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:40:00 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:40:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:40:01 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.stat\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) 17:40:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) 17:40:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:40:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000004080501ff0080fffdfffbae3ee3fb000c0003002f00001c7d0a00010c0002000002fa17711104a6"], 0x2c}}, 0x0) 17:40:01 executing program 5: execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000003c0)=[0x0, &(0x7f00000002c0)='/dev/rtc0\x00', &(0x7f0000000340)='/dev/rtc0\x00', 0x0]) socket$key(0xf, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x9}, @generic={0x0, 0x0, 0x1, 0x159}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0xf}, 0x48) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x100000000) write$P9_RLERRORu(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="6ca095c39b65543da267dcef390e0000070100010000002280586d608eba034d97036aa486f122ada6823c39211e01c909829dc3077ca8cff90200000000001a0764596b4c2db68110e0e5cc1b70f40c00c4734925d598d3181aefc42f0008d3484ecbd3024e2602fb6cd50a56f76e0779451375f1e84634a3da86d8b0296b176b5e10eeac462e0a9cb564dfad91918bfe1b1041f6a81c7ea16d56df85c495ce2da92b02864fd1b4a61aa703109e075ab64fc1a691ca930d1107ab9778391d507c0384656697c2589cac199fe719b2269a83294f0ec59376b7e2ca9fa4799d94607b713a236dc930dea0ee219b0e0de23d38f11b027d7d43e382a88c54bfc141498c4bf9946c3162b7ddb3db77d15b8f71360612cbfa49286a947118f57cebbea90bc9dea07afc7a2d61fd05e9846d5bf6bf3239a58d6274ae758c3c04deae3adef7a8bcb7dfcaffb2b4ef83606f1bf448e246c137075a2c20bdbaa581c2572a8a98150e860122517a787f0e1db6db2cd9dc08864da56da0f55124c7b950929314fe316c249512d60ff1692a8582f26dc676258e6e4dc4d7886483726684c9a051"], 0x1a1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe50) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) sendfile(r3, r3, &(0x7f0000000140), 0x8800000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f00000045c0)) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) [ 772.584040] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 17:40:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) [ 772.625760] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 772.646318] kasan: CONFIG_KASAN_INLINE enabled 17:40:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) [ 772.677207] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 772.720993] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 772.727371] CPU: 0 PID: 19292 Comm: syz-executor.0 Not tainted 4.19.34 #2 [ 772.734547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.744789] RIP: 0010:gre_timeout_obj_to_nlattr+0x77/0x1a0 [ 772.750874] Code: 97 85 c7 00 f1 f1 f1 f1 c7 40 04 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 b0 96 d3 fb 48 89 d8 48 c1 e8 03 <42> 0f b6 14 38 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 772.770080] RSP: 0018:ffff88805e91f3d0 EFLAGS: 00010246 [ 772.775548] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90005e7f000 [ 772.783028] RDX: 000000000001756f RSI: ffffffff8597a090 RDI: ffff888066506a40 [ 772.790407] RBP: ffff88805e91f460 R08: ffff88805fc080c0 R09: ffff8880611967a8 [ 772.798087] R10: ffffed100c232cf4 R11: ffff8880611967a0 R12: 1ffff1100bd23e7b [ 772.805545] R13: ffff888066506a40 R14: ffff88805e91f438 R15: dffffc0000000000 [ 772.810625] kobject: 'loop2' (00000000bd373bce): kobject_uevent_env [ 772.812830] FS: 00007ff6dd741700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 772.812840] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 772.812849] CR2: 00007f0eed38a330 CR3: 00000000a90f3000 CR4: 00000000001406f0 [ 772.812867] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 772.828533] kobject: 'loop2' (00000000bd373bce): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 772.834045] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 772.834051] Call Trace: [ 772.834147] ? memcpy+0x46/0x50 [ 772.834170] ? gre_print_conntrack+0xc0/0xc0 [ 772.876434] ? __nla_put+0x37/0x40 [ 772.880215] ? nla_put+0x116/0x150 [ 772.884286] cttimeout_default_get+0x69a/0xa80 [ 772.890286] ? cttimeout_del_timeout+0x1a0/0x1a0 [ 772.896778] ? __lock_is_held+0x9f/0x140 [ 772.900889] ? cttimeout_del_timeout+0x1a0/0x1a0 [ 772.905764] nfnetlink_rcv_msg+0xd12/0xfe0 [ 772.910184] ? nfnetlink_bind+0x2d0/0x2d0 [ 772.914542] ? avc_has_extended_perms+0x10f0/0x10f0 [ 772.919661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.925287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.931063] ? cred_has_capability+0x193/0x320 [ 772.935714] ? selinux_ipv4_output+0x50/0x50 [ 772.940199] ? sock_sendmsg+0xdd/0x130 [ 772.944116] ? mark_held_locks+0x100/0x100 [ 772.948381] netlink_rcv_skb+0x180/0x460 [ 772.952591] ? nfnetlink_bind+0x2d0/0x2d0 [ 772.956829] ? netlink_ack+0xb60/0xb60 [ 772.960745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.966385] ? ns_capable+0x23/0x30 [ 772.970041] ? __netlink_ns_capable+0x104/0x140 [ 772.974746] nfnetlink_rcv+0x1c0/0x460 [ 772.978802] ? nfnetlink_rcv_batch+0x1770/0x1770 [ 772.983658] ? netlink_deliver_tap+0x254/0xc20 [ 772.988476] ? kasan_check_write+0x14/0x20 [ 772.992828] netlink_unicast+0x53c/0x720 [ 772.997004] ? netlink_attachskb+0x770/0x770 [ 773.001439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.007002] netlink_sendmsg+0x8ae/0xd70 [ 773.011040] kobject: 'loop2' (00000000bd373bce): kobject_uevent_env [ 773.011182] ? netlink_unicast+0x720/0x720 [ 773.011204] ? selinux_socket_sendmsg+0x36/0x40 [ 773.020028] kobject: 'loop2' (00000000bd373bce): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 773.021958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.021974] ? security_socket_sendmsg+0x93/0xc0 [ 773.021995] ? netlink_unicast+0x720/0x720 [ 773.051094] sock_sendmsg+0xdd/0x130 [ 773.054946] ___sys_sendmsg+0x806/0x930 [ 773.059033] ? copy_msghdr_from_user+0x430/0x430 [ 773.063819] ? lock_downgrade+0x810/0x810 [ 773.067992] ? kasan_check_read+0x11/0x20 17:40:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 17:40:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 773.072336] ? __fget+0x367/0x540 [ 773.076095] ? iterate_fd+0x360/0x360 [ 773.079934] ? lock_downgrade+0x810/0x810 [ 773.084105] ? __fget_light+0x1a9/0x230 [ 773.088098] ? __fdget+0x1b/0x20 [ 773.091487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.097081] __sys_sendmsg+0x105/0x1d0 [ 773.100996] ? __ia32_sys_shutdown+0x80/0x80 [ 773.105544] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 773.110564] ? do_syscall_64+0x26/0x610 [ 773.114650] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.120074] ? do_syscall_64+0x26/0x610 [ 773.124075] __x64_sys_sendmsg+0x78/0xb0 [ 773.128276] do_syscall_64+0x103/0x610 [ 773.132191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.137396] RIP: 0033:0x4582f9 [ 773.140610] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 773.159740] RSP: 002b:00007ff6dd740c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:40:02 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x2, 0xa, 0x200008006, 0x0, r4, 0x7}, 0x2c) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) 17:40:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) [ 773.167489] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004582f9 [ 773.174895] RDX: 0000000000000000 RSI: 0000000020dddfc8 RDI: 0000000000000003 [ 773.182268] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 773.189623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6dd7416d4 [ 773.196906] R13: 00000000004c5958 R14: 00000000004d9c48 R15: 00000000ffffffff [ 773.204546] Modules linked in: [ 773.213991] kobject: 'loop3' (000000007aab64a5): kobject_uevent_env [ 773.239462] kobject: 'loop3' (000000007aab64a5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 773.247901] ---[ end trace 01f4c0a6b4cf0e8a ]--- [ 773.254642] RIP: 0010:gre_timeout_obj_to_nlattr+0x77/0x1a0 17:40:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) [ 773.276909] Code: 97 85 c7 00 f1 f1 f1 f1 c7 40 04 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 b0 96 d3 fb 48 89 d8 48 c1 e8 03 <42> 0f b6 14 38 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 773.317082] kobject: 'loop4' (0000000049468129): kobject_uevent_env [ 773.323553] kobject: 'loop4' (0000000049468129): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:40:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.mem_hardwall\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, '', 0x30}]}, 0x2) 17:40:02 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000280), 0x29c}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000007c0)={0x0, 0x0}}, 0xfffffffffffffd0b) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0x9, 0x10}, 0xc) recvmsg(r1, &(0x7f0000002600)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000180)=""/31, 0x1f}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000001240)=""/4096, 0x13d1}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000000800)=""/128, 0x80}, {&(0x7f0000000b80)=""/133, 0x85}], 0x7, &(0x7f0000000a80)=""/249, 0xf9, 0xfff}, 0x1) 17:40:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") r1 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000100)=0x18) [ 773.413641] kobject: 'loop1' (000000007542bd03): kobject_uevent_env [ 773.443549] kobject: 'loop1' (000000007542bd03): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 773.464207] RSP: 0018:ffff88805e91f3d0 EFLAGS: 00010246 [ 773.475037] kobject: 'loop1' (000000007542bd03): kobject_uevent_env [ 773.488924] kobject: 'loop1' (000000007542bd03): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 773.509728] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90005e7f000 [ 773.517158] kobject: 'loop2' (00000000bd373bce): kobject_uevent_env [ 773.529605] kobject: 'loop2' (00000000bd373bce): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 773.533029] RDX: 000000000001756f RSI: ffffffff8597a090 RDI: ffff888066506a40 [ 773.560652] kobject: 'loop3' (000000007aab64a5): kobject_uevent_env [ 773.567253] kobject: 'loop3' (000000007aab64a5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 773.569544] RBP: ffff88805e91f460 R08: ffff88805fc080c0 R09: ffff8880611967a8 [ 773.591833] kobject: 'loop5' (00000000ac24b44c): kobject_uevent_env [ 773.596973] R10: ffffed100c232cf4 R11: ffff8880611967a0 R12: 1ffff1100bd23e7b [ 773.601849] kobject: 'loop5' (00000000ac24b44c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 773.616297] R13: ffff888066506a40 R14: ffff88805e91f438 R15: dffffc0000000000 [ 773.626285] FS: 00007ff6dd741700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 773.635021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 773.649641] CR2: 00007f13284cb330 CR3: 00000000a90f3000 CR4: 00000000001406e0 [ 773.663919] Kernel panic - not syncing: Fatal exception [ 773.670285] Kernel Offset: disabled [ 773.673919] Rebooting in 86400 seconds..