000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x0, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1228.778609][T21647] IPVS: ftp: loaded support on port[0] = 21 14:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) [ 1228.924984][T21654] IPVS: ftp: loaded support on port[0] = 21 [ 1228.947256][T21650] IPVS: ftp: loaded support on port[0] = 21 14:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) 14:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) 14:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040), 0x80000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) 14:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040), 0x80000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) 14:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040), 0x80000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) 14:35:52 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1229.569434][T21630] bridge0: port 2(bridge_slave_1) entered blocking state [ 1229.576661][T21630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1229.576873][T21630] bridge0: port 1(bridge_slave_0) entered blocking state [ 1229.591077][T21630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1229.598652][T21630] device bridge0 entered promiscuous mode [ 1229.833362][T21979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.841242][T21979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1229.850702][T21979] device bridge0 left promiscuous mode [ 1230.821428][T21982] bridge0: port 2(bridge_slave_1) entered blocking state [ 1230.828623][T21982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1230.836051][T21982] bridge0: port 1(bridge_slave_0) entered blocking state [ 1230.843222][T21982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1230.850866][T21982] device bridge0 entered promiscuous mode [ 1230.857991][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:36:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x0, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpeername$packet(r2, 0x0, &(0x7f00000000c0)) 14:36:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x0, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:04 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x0, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x0, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1241.609265][T21992] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.617752][T21992] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.627240][T21992] device bridge0 left promiscuous mode [ 1241.642504][T21989] IPVS: ftp: loaded support on port[0] = 21 [ 1241.713029][T21987] IPVS: ftp: loaded support on port[0] = 21 14:36:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpeername$packet(r2, 0x0, &(0x7f00000000c0)) [ 1241.818290][T22094] IPVS: ftp: loaded support on port[0] = 21 14:36:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x0, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpeername$packet(r2, 0x0, &(0x7f00000000c0)) [ 1242.256819][T22407] IPVS: ftp: loaded support on port[0] = 21 14:36:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 1242.490374][T22007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.497547][T22007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1242.504954][T22007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.512092][T22007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1242.519706][T22007] device bridge0 entered promiscuous mode 14:36:06 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1242.855860][T22618] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.863804][T22618] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.872522][T22618] device bridge0 left promiscuous mode 14:36:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 1244.046356][T22620] bridge0: port 2(bridge_slave_1) entered blocking state [ 1244.053500][T22620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1244.061062][T22620] bridge0: port 1(bridge_slave_0) entered blocking state [ 1244.068181][T22620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1244.075788][T22620] device bridge0 entered promiscuous mode [ 1244.083165][T17036] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:36:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x0, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getpid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f00000011c0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c0001880000020032d7fe34e8d3714f96d55ca9126479641869cd0050229c34b58374ff030000611d21631f65dc69831186ce248d08b5b9642a28424bd35ae87221887e487306a332f105292bfb3edf19b3b19edf80d3ed25788c247126c58e62098d650b127f6fb2afa04dfe849fe454b2e5e18bb64de2188aa63b4876f7010f8261879dc4c002d3ba91dc666fb2c21e21123f783828d268d5c00a1f950c4202afb689ba06e17e119dca55c5706215ca8b411a8cdd1dc38edbc045c04cefc25bc1816f8748", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x26}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000003c0)={0x8, @pix={0xbb, 0x10001, 0x42475251, 0x4, 0xfffffffffffffffc, 0x3, 0x7, 0xfffffffffffffffb, 0x1, 0x7, 0x1}}) socket$inet(0x10, 0x3, 0xc) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x100, 0x7fff, 0x5, 0x1, 0x6}) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 14:36:16 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x0, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000900), 0x4) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x2, 0x4, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1253.761461][T22628] IPVS: ftp: loaded support on port[0] = 21 [ 1253.783036][T22632] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.791173][T22632] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.800007][T22632] device bridge0 left promiscuous mode [ 1253.897403][T22635] IPVS: ftp: loaded support on port[0] = 21 14:36:17 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="89", 0xffcc}], 0x1) recvmsg(r1, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1}, 0x2) 14:36:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f0000000840)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-generic\x00'}, 0x58) [ 1254.500866][T22716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.508016][T22716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.515401][T22716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.522559][T22716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.530218][T22716] device bridge0 entered promiscuous mode 14:36:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x4004ae8b, 0x0) 14:36:17 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x0, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:17 executing program 4: getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x4, 0x0, 0x0) 14:36:17 executing program 3: io_setup(0x0, &(0x7f0000000680)) [ 1254.729004][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1254.794862][T23156] IPVS: ftp: loaded support on port[0] = 21 [ 1254.834020][T23162] bridge0: port 2(bridge_slave_1) entered disabled state [ 1254.841896][T23162] bridge0: port 1(bridge_slave_0) entered disabled state [ 1254.850509][T23162] device bridge0 left promiscuous mode [ 1255.618938][T23158] bridge0: port 2(bridge_slave_1) entered blocking state [ 1255.626098][T23158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1255.633525][T23158] bridge0: port 1(bridge_slave_0) entered blocking state [ 1255.640632][T23158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1255.648177][T23158] device bridge0 entered promiscuous mode [ 1255.655292][T17145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:36:26 executing program 1: removexattr(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x100) 14:36:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() prlimit64(r0, 0xb, &(0x7f00000000c0)={0x80, 0x2}, &(0x7f0000000100)) 14:36:26 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='f2fs\x00', 0x0, 0x0) 14:36:26 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:26 executing program 4: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x5385, &(0x7f00000002c0)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:36:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:26 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) lsetxattr$security_selinux(0x0, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) [ 1262.961640][T23384] IPVS: ftp: loaded support on port[0] = 21 [ 1262.983452][T23382] bridge0: port 2(bridge_slave_1) entered disabled state [ 1262.991383][T23382] bridge0: port 1(bridge_slave_0) entered disabled state [ 1263.000418][T23382] device bridge0 left promiscuous mode 14:36:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x3b7) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0x4, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 14:36:26 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\b\x8c\xfa3\x90\xc8\xde\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00K\xf7\xa42\x00', 'syz0\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x11c) readv(r0, &(0x7f0000000980)=[{&(0x7f0000000200)=""/155, 0x9b}, {0x0}, {&(0x7f0000000100)=""/35, 0x23}, {0x0}], 0x4) prctl$PR_GET_TIMERSLACK(0x1e) [ 1263.262992][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.277305][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.284703][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.292135][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.299557][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.307000][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.315476][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.322898][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.330318][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.337734][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1263.345120][T24148] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 14:36:26 executing program 1: 14:36:26 executing program 0: [ 1263.488064][T24148] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 14:36:26 executing program 1: 14:36:26 executing program 0: 14:36:27 executing program 1: 14:36:27 executing program 0: [ 1264.062075][T23486] bridge0: port 2(bridge_slave_1) entered blocking state [ 1264.069213][T23486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1264.076676][T23486] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.083764][T23486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1264.091403][T23486] device bridge0 entered promiscuous mode 14:36:27 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:27 executing program 1: [ 1264.259337][T24123] bridge0: port 2(bridge_slave_1) entered disabled state [ 1264.267448][T24123] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.276266][T24123] device bridge0 left promiscuous mode [ 1265.046540][T24124] bridge0: port 2(bridge_slave_1) entered blocking state [ 1265.053687][T24124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1265.061126][T24124] bridge0: port 1(bridge_slave_0) entered blocking state [ 1265.068259][T24124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1265.075823][T24124] device bridge0 entered promiscuous mode 14:36:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:28 executing program 0: 14:36:28 executing program 4: 14:36:28 executing program 3: 14:36:28 executing program 1: 14:36:28 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:29 executing program 0: 14:36:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r1, &(0x7f0000008a80), 0x400000000000328, 0x0) 14:36:29 executing program 1: [ 1265.776684][T24130] bridge0: port 2(bridge_slave_1) entered disabled state [ 1265.784661][T24130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1265.793488][T24130] device bridge0 left promiscuous mode 14:36:29 executing program 4: 14:36:29 executing program 0: [ 1265.921535][T24136] IPVS: ftp: loaded support on port[0] = 21 14:36:29 executing program 4: [ 1266.376544][T24135] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.383732][T24135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1266.391205][T24135] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.398338][T24135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1266.405896][T24135] device bridge0 entered promiscuous mode 14:36:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:29 executing program 1: 14:36:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 14:36:29 executing program 0: keyctl$join(0x1, &(0x7f00000002c0)={'syz', 0x2}) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) 14:36:29 executing program 3: 14:36:29 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:30 executing program 1: [ 1266.685839][T24262] IPVS: ftp: loaded support on port[0] = 21 14:36:30 executing program 3: [ 1266.732327][T24267] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.740190][T24267] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.749546][T24267] device bridge0 left promiscuous mode [ 1266.806398][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.812333][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.818200][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.823969][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:36:30 executing program 1: 14:36:30 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xfffffffffffffff9, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='/dev/kvm\x00', 0x9, 0x3) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0x0, 0x3432564e, 0x3, @discrete={0x5}}) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:36:30 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xfffffffffffffff9, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='/dev/kvm\x00', 0x9, 0x3) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0x0, 0x3432564e, 0x3, @discrete={0x5}}) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xcd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secur\\ty.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:36:30 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) ustat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000002c0)={0x7fffffff, 0x24, "1315862fb83cb09e0233b57157da00ac3fce6dcb184ebb7365e6012a68396fe508a43e53"}) rmdir(&(0x7f0000000340)='./file0//ile0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x2) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="3aeea872077445d7fe557a06781a0ffa4271afb867dd1686c4a50c18cbc7ca2589cab37cab678500c958d38c80ffc136811f1f909a9179adc4", 0x39, 0xffffffffffffffff) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000f24000)=0xfc77) [ 1267.599483][T24432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1267.606687][T24432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1267.614120][T24432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.621288][T24432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1267.628991][T24432] device bridge0 entered promiscuous mode 14:36:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ustat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000002c0)={0x7fffffff, 0x28, "1315862fb83cb09e0233b57157da00ac3fce6dcb184ebb7365e6012a68396fe508a43e53d374fda1"}) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) socket(0x0, 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000004c40)={'syz1', "a819a65b1978cb87e9993a35e4cf44dbe26d4f0d882ec1a7c96c57528f9a6ecea810fa1a7ee40861b93eeca7cb2af281fdf430443fb2ab4c9afcaa91d7c19fd53b221def60084ecf47d3aba780d25258134bff599bdfeb045511383896c7e3e8a04908dd5200152a"}, 0x6c) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="3aeea872077445d7fe557a06781a0ffa4271afb867dd1686c4a50c18cbc7ca2589cab37cab678500c958d38c80ffc136811f1f909a9179adc499c3b36c3be19f0cf7dd84405bf3cf18bcf03c303a34bedaa49f8da691a4c488bc7cea922d15507fc54ddc285c8f7c4641a6f1624dd374e08036f5e569fa709d2dfe13629fbbd82be959867a91699c7e669d3bdb231ea235a61fe5fdc86b1f04b26ec3148cc7a0cafe0d212ed4d501a418832e8de709f8fe6d098857cbae8f36928f4025b862343b5bc538e2c432b776f98bd0fa408adc420e0066d4c32a768fc35aada2c3e38ddc", 0xe1, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000f24000)=0xfc77) 14:36:32 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:32 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 14:36:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYRES32], 0x4) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 14:36:32 executing program 4: 14:36:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001540)={&(0x7f0000000080)={0x2, 0x4e21, @dev}, 0x10, &(0x7f0000000100)=[{&(0x7f0000001880)}, {&(0x7f0000000340)="3bfaaf13c25f446f9271eebef1a20229007b6d779e2359869781cd2bffcc", 0x1e}], 0x2, &(0x7f0000001680)=[@ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @timestamp={0x44, 0x8, 0x6, 0x3, 0x9, [{[], 0x7f}]}]}}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6}]}}}], 0x50}, 0x0) [ 1269.588398][T24809] bridge0: port 2(bridge_slave_1) entered disabled state [ 1269.596338][T24809] bridge0: port 1(bridge_slave_0) entered disabled state [ 1269.604990][T24809] device bridge0 left promiscuous mode [ 1269.688821][T24814] IPVS: ftp: loaded support on port[0] = 21 14:36:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001540)={&(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000001880)}, {0x0}], 0x2, &(0x7f0000001680)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x0, [{0x7, 0x2}]}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x100000001}}, @ip_retopts={{0x20, 0x0, 0x7, {[@rr={0x7, 0x7, 0x3ff, [@multicast2]}, @ra={0x94, 0x6, 0x3}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffffffffffffb}}], 0x70}, 0x40) 14:36:33 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ustat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000002c0)={0x7fffffff, 0x28, "1315862fb83cb09e0233b57157da00ac3fce6dcb184ebb7365e6012a68396fe508a43e53d374fda1"}) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) socket(0x0, 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000004c40)={'syz1', "a819a65b1978cb87e9993a35e4cf44dbe26d4f0d882ec1a7c96c57528f9a6ecea810fa1a7ee40861b93eeca7cb2af281fdf430443fb2ab4c9afcaa91d7c19fd53b221def60084ecf47d3aba780d25258134bff599bdfeb045511383896c7e3e8a04908dd5200152a"}, 0x6c) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="3aeea872077445d7fe557a06781a0ffa4271afb867dd1686c4a50c18cbc7ca2589cab37cab678500c958d38c80ffc136811f1f909a9179adc499c3b36c3be19f0cf7dd84405bf3cf18bcf03c303a34bedaa49f8da691a4c488bc7cea922d15507fc54ddc285c8f7c4641a6f1624dd374e08036f5e569fa709d2dfe13629fbbd82be959867a91699c7e669d3bdb231ea235a61fe5fdc86b1f04b26ec3148cc7a0cafe0d212ed4d501a418832e8de709f8fe6d098857cbae8f36928f4025b862343b5bc538e2c432b776f98bd0fa408adc420e0066d4c32a768fc35aada2c3e38ddc", 0xe1, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000f24000)=0xfc77) [ 1270.032559][ T24] audit: type=1800 audit(1563806193.316:47): pid=24808 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16780 res=0 14:36:33 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001540)={&(0x7f0000000080)={0x2, 0x4e21, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @rand_addr=0x3}}}, @ip_retopts={{0x34, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x8, [{0x7, 0x2}]}, @timestamp={0x44, 0x8, 0x0, 0x3, 0x9, [{}]}, @noop, @noop, @timestamp={0x44, 0x8, 0x7b4, 0x0, 0x1, [{[], 0xffffffff}]}, @noop, @ra={0x94, 0x6, 0x8}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x100000001}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@cipso={0x86, 0xa, 0x9, [{0x6, 0x2}, {0x0, 0x2}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffffffffffffb}}, @ip_retopts={{0x40, 0x0, 0x7, {[@ssrr={0x89, 0x1f, 0x8, [@dev={0xac, 0x14, 0x14, 0x28}, @multicast1, @broadcast, @local, @remote, @dev={0xac, 0x14, 0x14, 0x16}, @dev={0xac, 0x14, 0x14, 0x16}]}, @noop, @noop, @end, @end, @ssrr={0x89, 0xb, 0x1, [@multicast1, @multicast1]}]}}}], 0xe8}, 0x40) 14:36:33 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = gettid() setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffdc7) timer_create(0x0, &(0x7f0000000200)={0x0, 0x12}, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) modify_ldt$read_default(0x2, 0x0, 0x0) tkill(r0, 0x1000000000016) 14:36:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@empty, @remote, @dev]}, 0x38) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000580)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) [ 1270.609373][T24832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.616625][T24832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1270.624021][T24832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.631163][T24832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1270.638876][T24832] device bridge0 entered promiscuous mode [ 1271.696451][T17145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:36:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:35 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ustat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000002c0)={0x7fffffff, 0x28, "1315862fb83cb09e0233b57157da00ac3fce6dcb184ebb7365e6012a68396fe508a43e53d374fda1"}) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) socket(0x0, 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000004c40)={'syz1', "a819a65b1978cb87e9993a35e4cf44dbe26d4f0d882ec1a7c96c57528f9a6ecea810fa1a7ee40861b93eeca7cb2af281fdf430443fb2ab4c9afcaa91d7c19fd53b221def60084ecf47d3aba780d25258134bff599bdfeb045511383896c7e3e8a04908dd5200152a"}, 0x6c) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="3aeea872077445d7fe557a06781a0ffa4271afb867dd1686c4a50c18cbc7ca2589cab37cab678500c958d38c80ffc136811f1f909a9179adc499c3b36c3be19f0cf7dd84405bf3cf18bcf03c303a34bedaa49f8da691a4c488bc7cea922d15507fc54ddc285c8f7c4641a6f1624dd374e08036f5e569fa709d2dfe13629fbbd82be959867a91699c7e669d3bdb231ea235a61fe5fdc86b1f04b26ec3148cc7a0cafe0d212ed4d501a418832e8de709f8fe6d098857cbae8f36928f4025b862343b5bc538e2c432b776f98bd0fa408adc420e0066d4c32a768fc35aada2c3e38ddc", 0xe1, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000f24000)=0xfc77) 14:36:35 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2330b42e2f66"], 0x6) 14:36:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000240)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4}}, 0x10) 14:36:35 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x82) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140)=0xffffffffffffffcf, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) 14:36:35 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1271.822486][T25661] bridge0: port 2(bridge_slave_1) entered disabled state [ 1271.830531][T25661] bridge0: port 1(bridge_slave_0) entered disabled state [ 1271.839347][T25661] device bridge0 left promiscuous mode 14:36:35 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) socket$netlink(0x10, 0x3, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000240)="f3fdc97009d5a4098b1f276e39301bf40dcd711ca161520e8f7e9c7b9635c331c02a0c07c2d6eb681d7a4966a9e6ed42dfa2", 0x32, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', 0x0, &(0x7f0000000600)=ANY=[], 0x0, 0x0) fchdir(r0) r1 = add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000440)="3680266775db65646fe57c3ee9a8a78f55d5631897d5d727d383abbbe4e6fc5a71aef92c44690a3aded177d99ade55499adaa9b3025d7b2034301defa78cac401137ecd943a8fc1bcd370edba44e5acb87", 0x51, 0xfffffffffffffff9) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)=@builtin='builtin_trusted\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x0) [ 1271.950350][T25695] IPVS: ftp: loaded support on port[0] = 21 14:36:35 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r0, 0x0, 0x0, 0x0}, 0x30) 14:36:35 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000000c0)={0x0, 0x0}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:36:35 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ustat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000002c0)={0x7fffffff, 0x28, "1315862fb83cb09e0233b57157da00ac3fce6dcb184ebb7365e6012a68396fe508a43e53d374fda1"}) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) socket(0x0, 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000004c40)={'syz1', "a819a65b1978cb87e9993a35e4cf44dbe26d4f0d882ec1a7c96c57528f9a6ecea810fa1a7ee40861b93eeca7cb2af281fdf430443fb2ab4c9afcaa91d7c19fd53b221def60084ecf47d3aba780d25258134bff599bdfeb045511383896c7e3e8a04908dd5200152a"}, 0x6c) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="3aeea872077445d7fe557a06781a0ffa4271afb867dd1686c4a50c18cbc7ca2589cab37cab678500c958d38c80ffc136811f1f909a9179adc499c3b36c3be19f0cf7dd84405bf3cf18bcf03c303a34bedaa49f8da691a4c488bc7cea922d15507fc54ddc285c8f7c4641a6f1624dd374e08036f5e569fa709d2dfe13629fbbd82be959867a91699c7e669d3bdb231ea235a61fe5fdc86b1f04b26ec3148cc7a0cafe0d212ed4d501a418832e8de709f8fe6d098857cbae8f36928f4025b862343b5bc538e2c432b776f98bd0fa408adc420e0066d4c32a768fc35aada2c3e38ddc", 0xe1, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000f24000)=0xfc77) 14:36:35 executing program 3: 14:36:35 executing program 0: [ 1272.839496][T25932] bridge0: port 2(bridge_slave_1) entered blocking state [ 1272.846646][T25932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1272.854050][T25932] bridge0: port 1(bridge_slave_0) entered blocking state [ 1272.861366][T25932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1272.869189][T25932] device bridge0 entered promiscuous mode 14:36:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:37 executing program 3: 14:36:37 executing program 0: 14:36:37 executing program 1: 14:36:37 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000000c0)={0x0, 0x0}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:36:37 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1273.985125][T26515] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.993035][T26515] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.001850][T26515] device bridge0 left promiscuous mode 14:36:37 executing program 1: 14:36:37 executing program 0: 14:36:37 executing program 3: 14:36:37 executing program 1: 14:36:37 executing program 3: [ 1274.219556][T26525] IPVS: ftp: loaded support on port[0] = 21 14:36:37 executing program 0: [ 1274.736621][T26529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.743809][T26529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.751432][T26529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.758571][T26529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.766146][T26529] device bridge0 entered promiscuous mode 14:36:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:38 executing program 3: 14:36:38 executing program 4: 14:36:38 executing program 1: 14:36:38 executing program 0: 14:36:38 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:38 executing program 3: 14:36:38 executing program 1: 14:36:38 executing program 0: [ 1275.054965][T26554] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.063245][T26554] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.071876][T26554] device bridge0 left promiscuous mode [ 1275.093031][T26555] IPVS: ftp: loaded support on port[0] = 21 14:36:38 executing program 4: 14:36:38 executing program 3: 14:36:38 executing program 0: [ 1275.646454][T26558] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.654147][T26558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.661840][T26558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.669088][T26558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.676807][T26558] device bridge0 entered promiscuous mode [ 1275.736442][T17036] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:36:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:39 executing program 1: 14:36:39 executing program 4: 14:36:39 executing program 0: 14:36:39 executing program 3: 14:36:39 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:39 executing program 4: 14:36:39 executing program 3: 14:36:39 executing program 0: [ 1275.908609][T26581] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.916505][T26581] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.925204][T26581] device bridge0 left promiscuous mode 14:36:39 executing program 1: [ 1276.055806][T26587] IPVS: ftp: loaded support on port[0] = 21 14:36:39 executing program 0: 14:36:39 executing program 4: [ 1276.555573][T26593] bridge0: port 2(bridge_slave_1) entered blocking state [ 1276.562970][T26593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1276.570705][T26593] bridge0: port 1(bridge_slave_0) entered blocking state [ 1276.577993][T26593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1276.585696][T26593] device bridge0 entered promiscuous mode 14:36:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:42 executing program 3: 14:36:42 executing program 0: 14:36:42 executing program 1: 14:36:42 executing program 4: 14:36:42 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:42 executing program 1: 14:36:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0xfffffffffffffd84) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000300)="bb", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f00000019c0)='h', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000003040)="cb", 0x1}, {&(0x7f00000030c0)="c6", 0x1}], 0x2}}, {{0x0, 0x0, &(0x7f0000006c80)=[{&(0x7f0000006980)='i', 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff83}}], 0x5, 0x4000010) 14:36:42 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1278.895954][T26613] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.903780][T26613] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.913115][T26613] device bridge0 left promiscuous mode 14:36:42 executing program 4: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x40, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000140)={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000440)}, {0x0}], 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x4000000000008003, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000001c0)={0x0, 0x0, 0x2}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, r1) getresgid(0x0, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000780)}], 0x2, 0x0) open$dir(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) [ 1279.037544][T26616] IPVS: ftp: loaded support on port[0] = 21 14:36:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000300)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000001c0)=""/159, 0x9f}, 0x120) readv(r0, 0x0, 0x0) 14:36:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001400)={0x2, 0x5, 0x0, 0x8, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000000000000}, 0x0) [ 1279.344717][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.352229][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.359662][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.367161][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.374575][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.382014][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.389486][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.396932][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.404343][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.411852][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.419349][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.426798][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.434198][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.441695][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.449146][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.456594][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.464085][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.471553][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.478986][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.486476][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.493876][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.501354][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.508858][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.516349][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.523737][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.531243][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.538760][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.546142][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.553617][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.561083][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.568518][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.575908][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.583371][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.590848][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.598296][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.605689][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.613151][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.620605][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.628038][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.635433][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.642959][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.650403][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.657879][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.665272][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.672734][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.680159][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.687612][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.695039][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.702510][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.709933][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.717377][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.724774][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.732254][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.739720][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.747192][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.754583][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.762040][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.769476][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.776934][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.784318][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.791747][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.799165][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.806694][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.814183][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.821612][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.829035][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.836454][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.843841][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.851268][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.858708][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.866093][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.873515][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.880966][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.888829][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.896232][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.903724][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.911166][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.918610][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.926115][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.933554][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.940988][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.948436][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.955823][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.963250][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.970691][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.978155][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.985540][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1279.992976][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.000402][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.008100][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.015491][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.023002][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.030422][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.037840][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.045239][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.052765][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.060228][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.067658][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.075049][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.082489][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.089922][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.097377][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.104765][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.112212][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.119673][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.127110][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.134501][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.141986][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.149413][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.156835][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.164219][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.171639][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.179061][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.186473][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.193852][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.201266][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.208939][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.216367][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.223746][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.231160][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.238577][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.245965][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.253383][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.260802][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.269784][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.277279][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.284659][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.292075][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.299522][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.306936][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.314784][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.322211][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.329630][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.337059][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.344438][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.351856][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.359263][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.366696][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.374086][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.381508][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.388992][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.396427][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.403812][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.411231][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.418647][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.426029][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.433441][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.440854][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.448873][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.456253][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.463681][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.471193][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.478611][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.486012][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.493433][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.500858][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.508292][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.515684][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.523109][T20428] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1280.602870][T20428] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz0] on syz0 14:36:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0x0, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:45 executing program 3: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:45 executing program 0: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:45 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:45 executing program 4: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1282.388353][T27050] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.396840][T27050] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.406261][T27050] device bridge0 left promiscuous mode [ 1282.439372][T27051] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.448259][T27051] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.457311][T27051] device bridge0 left promiscuous mode 14:36:45 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1282.479981][T27063] IPVS: ftp: loaded support on port[0] = 21 [ 1282.514397][T27057] IPVS: ftp: loaded support on port[0] = 21 14:36:46 executing program 3: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1283.119822][T27058] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.128179][T27058] bridge0: port 1(bridge_slave_0) entered disabled state [ 1283.137152][T27058] device bridge0 left promiscuous mode 14:36:46 executing program 4: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:46 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) 14:36:47 executing program 0: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:47 executing program 4: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1284.003023][T27688] bridge0: port 2(bridge_slave_1) entered blocking state [ 1284.010411][T27688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1284.018894][T27688] bridge0: port 1(bridge_slave_0) entered blocking state [ 1284.026503][T27688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1284.036062][T27688] device bridge0 entered promiscuous mode [ 1284.071865][T27689] bridge0: port 2(bridge_slave_1) entered blocking state [ 1284.079306][T27689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1284.087736][T27689] bridge0: port 1(bridge_slave_0) entered blocking state [ 1284.095211][T27689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1284.104617][T27689] device bridge0 entered promiscuous mode [ 1284.686586][T20428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1284.694729][T20428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:36:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0x0, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:49 executing program 3: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:36:49 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) 14:36:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1286.394286][T27700] bridge0: port 2(bridge_slave_1) entered blocking state [ 1286.401708][T27700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1286.410204][T27700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1286.417647][T27700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1286.427356][T27700] device bridge0 entered promiscuous mode [ 1286.441147][T11906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1286.547789][T27703] IPVS: ftp: loaded support on port[0] = 21 14:36:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:55 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) 14:36:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0x0, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1292.516559][T27818] IPVS: ftp: loaded support on port[0] = 21 [ 1292.525881][T27820] IPVS: ftp: loaded support on port[0] = 21 14:36:55 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00'}) [ 1292.752096][T27952] IPVS: ftp: loaded support on port[0] = 21 14:36:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, 0xffffffffffffffff, 0xd, r3, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:56 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00'}) 14:36:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1293.124562][T28107] IPVS: ftp: loaded support on port[0] = 21 14:36:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r3, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r4, 0xd, 0xffffffffffffffff, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:56 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00'}) 14:36:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1293.738755][T28270] IPVS: ftp: loaded support on port[0] = 21 [ 1293.761451][T28264] IPVS: ftp: loaded support on port[0] = 21 [ 1293.834894][T28311] IPVS: ftp: loaded support on port[0] = 21 14:36:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0x0, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0x0, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1294.184004][T28559] IPVS: ftp: loaded support on port[0] = 21 14:36:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r3, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r4, 0xd, 0xffffffffffffffff, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1294.431565][T28622] IPVS: ftp: loaded support on port[0] = 21 [ 1294.491401][T28616] IPVS: ftp: loaded support on port[0] = 21 [ 1294.657177][T28780] IPVS: ftp: loaded support on port[0] = 21 14:36:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0x0, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r3, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r4, 0xd, 0xffffffffffffffff, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:36:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r3, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r4, 0xd, 0xffffffffffffffff, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1295.525292][T28880] IPVS: ftp: loaded support on port[0] = 21 [ 1295.568262][T28883] IPVS: ftp: loaded support on port[0] = 21 [ 1295.632817][T28882] IPVS: ftp: loaded support on port[0] = 21 14:36:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x0) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1296.389381][T28989] IPVS: ftp: loaded support on port[0] = 21 14:36:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r3, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r4, 0xd, 0xffffffffffffffff, 0x2) unshare(0x40000000) r5 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1296.825930][T28993] IPVS: ftp: loaded support on port[0] = 21 14:37:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x0) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1297.264829][T28997] IPVS: ftp: loaded support on port[0] = 21 14:37:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1310.420287][T29004] IPVS: ftp: loaded support on port[0] = 21 14:37:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x0) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:14 executing program 1: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:37:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:14 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1311.068645][T29009] IPVS: ftp: loaded support on port[0] = 21 [ 1311.143929][T29012] IPVS: ftp: loaded support on port[0] = 21 [ 1311.155650][T29014] bridge0: port 2(bridge_slave_1) entered disabled state [ 1311.164567][T29014] device bridge0 left promiscuous mode 14:37:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0x0, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1311.216661][T29021] IPVS: ftp: loaded support on port[0] = 21 [ 1311.379408][T29102] IPVS: ftp: loaded support on port[0] = 21 [ 1312.250680][T29022] bridge0: port 2(bridge_slave_1) entered blocking state [ 1312.257852][T29022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1312.267243][T29022] bridge0: port 1(bridge_slave_0) entered blocking state [ 1312.275108][T29022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1312.282619][T29022] device bridge0 entered promiscuous mode 14:37:15 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:37:15 executing program 1: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1312.620525][T29432] bridge0: port 2(bridge_slave_1) entered disabled state [ 1312.628470][T29432] bridge0: port 1(bridge_slave_0) entered disabled state [ 1312.637287][T29432] device bridge0 left promiscuous mode [ 1313.906503][T29430] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.913601][T29430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1313.921158][T29430] device bridge0 entered promiscuous mode [ 1313.928806][T29433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.935908][T29433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1313.943337][T29433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.950446][T29433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1313.958216][T29433] device bridge0 entered promiscuous mode [ 1313.965433][T20428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1313.973641][T20428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:37:17 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:37:17 executing program 1: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1314.235055][T29437] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.243421][T29437] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.252374][T29437] device bridge0 left promiscuous mode [ 1315.502506][T29439] bridge0: port 2(bridge_slave_1) entered disabled state [ 1315.511728][T29439] device bridge0 left promiscuous mode [ 1317.396488][T29472] bridge0: port 2(bridge_slave_1) entered blocking state [ 1317.403578][T29472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1317.411067][T29472] bridge0: port 1(bridge_slave_0) entered blocking state [ 1317.418191][T29472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1317.425692][T29472] device bridge0 entered promiscuous mode 14:37:20 executing program 5: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:37:21 executing program 1: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1318.062941][T29545] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.070838][T29545] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.079520][T29545] device bridge0 left promiscuous mode [ 1319.066638][T29547] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.073737][T29547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1319.081298][T29547] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.088412][T29547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.095905][T29547] device bridge0 entered promiscuous mode 14:37:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000100)={0x2, 0x1000004e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6_vti0\x00', 0x10e) r1 = memfd_create(&(0x7f0000000080)='selinux/.bdev,\x00', 0x0) ftruncate(r1, 0x4000b) sendfile(r0, r1, 0x0, 0x2000000020011) 14:37:29 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x25) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x20d) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[@ANYRES32], 0x4) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8, 0x0, 0x21}) 14:37:29 executing program 1: sysfs$2(0x2, 0x0, 0x0) dup(0xffffffffffffffff) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000000280)=""/223, 0xdf, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @remote}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:37:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x0) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:29 executing program 0: madvise(&(0x7f0000be4000/0x2000)=nil, 0x2000, 0xc) clone(0x2080400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:37:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1325.895189][T29659] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.903422][T29659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1325.912643][T29659] device bridge0 entered promiscuous mode [ 1325.926371][T12914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 14:37:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x0) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1325.981844][T29663] IPVS: ftp: loaded support on port[0] = 21 14:37:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x20d) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYRES32], 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 14:37:29 executing program 1: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000803, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000007ec0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)='u', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000840)="0d84b83479575243f335", 0xa}, {&(0x7f0000000880)="7110f6e89d6e040313995521", 0xc}, {&(0x7f00000008c0)="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", 0x81b}], 0x3}}], 0x2, 0x0) 14:37:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x0) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000803, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = dup(r0) sendmmsg$inet6(r1, &(0x7f0000007ec0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000280)="00a4162b73fddf", 0x7}, {0x0}], 0x3, &(0x7f0000000540)=[@tclass={{0x14, 0x29, 0x43, 0xcc2f}}, @dstopts_2292={{0x60, 0x29, 0x4, {0x3b, 0x8, [], [@calipso={0x7, 0x20, {0x3e55, 0x6, 0x8, 0x2, [0x100000000, 0x8, 0x200]}}, @generic={0x8000, 0x21, "8a4c12f1df1a04821ffbcd306ea49805e7ef5a9331833c98b36f3184cd7e21f9b0"}]}}}, @tclass={{0x14, 0x29, 0x43, 0x100000001}}, @dontfrag={{0x14, 0x29, 0x3e, 0x100000001}}, @flowinfo={{0x14, 0x29, 0xb, 0x100000000}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}], 0xe8}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000049c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @broadcast}}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x0, 0x4, 0x0, 0x0, 0x0, [@ipv4, @local]}}}], 0x88}}], 0x3, 0x4000) 14:37:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0x0, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(0x0, 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1326.862517][T30003] IPVS: ftp: loaded support on port[0] = 21 14:37:30 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setsig(r0, 0xa, 0x25) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x20d) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[@ANYRES32], 0x4) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8, 0x0, 0x21}) 14:37:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) llistxattr(&(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x4a7) [ 1327.016487][T30175] IPVS: ftp: loaded support on port[0] = 21 [ 1327.021180][ T24] audit: type=1800 audit(1563806250.306:48): pid=29748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16903 res=0 14:37:30 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x101002) write$RDMA_USER_CM_CMD_GET_EVENT(r0, 0x0, 0x0) 14:37:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x4004ae99, 0xff000000) 14:37:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) getresgid(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 14:37:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3ff, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 14:37:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 14:37:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(0x0, 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x3, r1, 0x0, 0x0, 0x0) [ 1328.096450][T30593] IPVS: ftp: loaded support on port[0] = 21 14:37:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) getresgid(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 14:37:39 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') write$cgroup_pid(r2, 0x0, 0x0) 14:37:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x2000, 0x0) 14:37:39 executing program 5: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000a80)=""/229, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x101002) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f00000004c0)}}, 0x10) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x2, 0x0) umount2(&(0x7f0000000140)='./file0/file0\x00', 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000340)={0x3d, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={0x0, r2}, 0x10) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 14:37:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) getresgid(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 14:37:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(0x0, 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1336.474323][T30943] IPVS: ftp: loaded support on port[0] = 21 14:37:39 executing program 5: r0 = memfd_create(&(0x7f0000000000)='dev ', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) fgetxattr(r0, &(0x7f0000000180)=@known='system.posix_acl_access\x00', &(0x7f0000000d00)=""/158, 0x9e) 14:37:40 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) close(r0) socket(0x2, 0x805, 0x0) io_setup(0x1e, &(0x7f0000000000)=0x0) io_submit(r1, 0x300, &(0x7f0000000080)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x5ee}]) 14:37:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x0, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000010000009500000000001d395e9decf70299c67dd3fcc8cba8d59017e336be980477e54584085b5675e0963fd27484e01f80da24ad6f13959610fc75a02b6f454aab3e6ff0a9c39d9a8969dd1f2d29b8ee3988ca677ebcb9997132d789db6f00"/127], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:37:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001400)={0x2, 0x9, 0x0, 0x8, 0x2}, 0x10}, 0x1, 0x2000000000000000}, 0x0) 14:37:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) getresgid(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 14:37:40 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) [ 1336.979384][T31168] IPVS: ftp: loaded support on port[0] = 21 14:37:40 executing program 5: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)=""/143, &(0x7f0000000300)=0x8f) fallocate(r0, 0x11, 0x0, 0xd000000) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) 14:37:40 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000440), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_FLUSH(r0, 0x0, 0x8000) open(&(0x7f0000000280)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) 14:37:40 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:40 executing program 1: [ 1337.345150][ T24] audit: type=1800 audit(1563806260.626:49): pid=31376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16890 res=0 14:37:40 executing program 4: ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:40 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:37:40 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) accept4$x25(r0, &(0x7f0000000080)={0x9, @remote}, 0x0, 0x0) [ 1337.710150][T31491] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.717710][T31491] device bridge0 left promiscuous mode 14:37:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x0, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:41 executing program 5: sysfs$2(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000380)) syz_open_dev$swradio(0x0, 0x1, 0x2) syz_open_dev$mice(0x0, 0x0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) connect$pptp(r0, &(0x7f0000000480)={0x18, 0x2, {0x0, @remote}}, 0x1e) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:37:41 executing program 4: ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:41 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") write$sndseq(r0, &(0x7f0000000040)=[{0x80ffffff, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 14:37:41 executing program 4: ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:41 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, 0x0) 14:37:41 executing program 4: r0 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) [ 1338.078305][T31709] IPVS: ftp: loaded support on port[0] = 21 14:37:41 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000002c0)='cifq,idmap\x00', 0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) 14:37:41 executing program 4: r0 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$audion(0x0, 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000380)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff8180000008003950323030302e9e"], 0x15) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 14:37:41 executing program 4: r0 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) [ 1338.371218][T31825] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1338.515911][T31672] bridge0: port 2(bridge_slave_1) entered disabled state [ 1338.523199][T31672] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.530703][T31672] device bridge0 left promiscuous mode 14:37:41 executing program 4: syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) [ 1339.066557][T31707] bridge0: port 2(bridge_slave_1) entered blocking state [ 1339.073680][T31707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1339.081131][T31707] bridge0: port 1(bridge_slave_0) entered blocking state [ 1339.088265][T31707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1339.095943][T31707] device bridge0 entered promiscuous mode [ 1339.137475][T31939] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.144807][T31939] bridge0: port 1(bridge_slave_0) entered disabled state [ 1339.152181][T31939] device bridge0 left promiscuous mode 14:37:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x0, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:44 executing program 3: 14:37:44 executing program 4: syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:44 executing program 0: 14:37:44 executing program 1: 14:37:44 executing program 5: 14:37:44 executing program 5: 14:37:44 executing program 3: 14:37:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600610000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000020000000000005000601000a00000a00000000000000fe8000000000000000000000000000ff000004000000000081fdaf920b4995e2c0c6e73e7facf04aaf9bd93772449c352906703bff4e27e4dc7640d3c873a72b1886e0825c77e44cd574fe4311b1725b29de560f8ab5b6bf79abf4a2630a70e7534eb9c57412c7aee3002f7a4fc31c6a4868f9cf77519779e7859b98dfb968a4fff6d67c6afa2e00089933a423c3e8f4b6c6c06475e1c71e3c6a6d58dd0413b6c947d197f0d4d3912d11422f04670fb1d38220c959cb0942e7d94901b0e74bfd26bef068d455c3019a6ca29d9ee56459ec3742d95770974f981bae6b36781332df211a6c274eac1494ba241c9b4637edf86729764d8875c75a3cbef5ba2f8481a661a897e4695164210b10e529ea30c140b7ef7227ba25a03d6194d6afb69844cde594129ad687db45df1594c094fac2bc87bc28a5d123f82333075f6343829e7d82628f514ad5efb8be10a4cf7303bc3eaabc5ebe0469b5938f4c037a3b5b6b90e7fb9fa80697309acace208ca053fcd2eac7950116359936015bc5990069302ea89239d4c37f0f527fad6c530810b665d689e05b6a046375847662dbfcf40bc1d4be078b1e68193a30ac0b4bd1d03be2bee7ac2c39a5a1f56680f10ee29655b5669ec891d44b04c3891bff4ab338f1baf3902f7a00d419bc45fcecfe78e8418f0626e48f375fc16d5e427d5ecd606fc2"], 0xa0}}, 0x0) 14:37:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 14:37:44 executing program 4: syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000002c0)={0x9c7a, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:44 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) [ 1340.987702][T32053] IPVS: ftp: loaded support on port[0] = 21 14:37:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:44 executing program 5: 14:37:44 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, 0x0) 14:37:44 executing program 0: 14:37:44 executing program 1: 14:37:44 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:44 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:44 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffc4b) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000000), 0xa) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) prctl$PR_SET_TSC(0x1a, 0x3) memfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RLOCK(r0, 0x0, 0x0) 14:37:44 executing program 1: fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='/dev/kvm\x00', 0x9, 0x3) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x0, 0x3432564e, 0x3, @discrete={0x5}}) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}]}, 0x18, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[0x0], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:37:44 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, 0x0) 14:37:44 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) [ 1341.648917][T32285] IPVS: ftp: loaded support on port[0] = 21 14:37:45 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:45 executing program 1: r0 = socket(0x1e, 0x2, 0x0) recvmmsg(r0, &(0x7f00000026c0)=[{{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000a40)=""/7, 0x7}], 0x1}}], 0x1, 0x0, 0x0) 14:37:45 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:45 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, 0x0) 14:37:45 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) [ 1342.212692][ T24] audit: type=1800 audit(1563806265.496:50): pid=32374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16927 res=0 14:37:45 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x0, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:45 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:45 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x7b, 0x0}}], 0x26d, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='syscall\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x8410, 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:37:45 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) [ 1342.416101][T32422] IPVS: ftp: loaded support on port[0] = 21 14:37:45 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:45 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:46 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x0, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) 14:37:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:46 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:46 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:46 executing program 4: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000002c0)={0x0, "56138a19c5bfc19f0e059269358680808f18a43d74c32db98ab148d9993ccc72"}) [ 1343.234985][T32516] IPVS: ftp: loaded support on port[0] = 21 14:37:46 executing program 1: 14:37:46 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x1fffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) write$P9_RLOPEN(r0, &(0x7f00000003c0)={0x18, 0xd, 0x1, {{0xb0, 0x3}}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f00000008c0)="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", &(0x7f00000009c0)=""/167}, 0x18) io_setup(0x2, &(0x7f0000000100)=0x0) io_getevents(r2, 0x800000000000009, 0x2, &(0x7f0000000580)=[{}, {}], 0x0) sendto(r1, &(0x7f0000000880)="c5", 0x1, 0x4000051, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x0, @pix={0x0, 0x0, 0x37303250, 0xb, 0xffffffffffffffe0, 0x8, 0xb, 0x2, 0x1, 0x6, 0x1, 0x7}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast1}}, [0x5, 0x4, 0x81, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x1, 0x0, 0x7fff, 0x2, 0x2, 0xd14b, 0x7ff]}, &(0x7f0000000500)=0x100) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000380)) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x101) getrandom(&(0x7f00000005c0)=""/198, 0xfffffffffffffeb0, 0x3) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x4, 0x2, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x9}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r4, &(0x7f0000000740)=""/197}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000840)={r3, 0x7}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 14:37:46 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x40002, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000000), 0xa) truncate(&(0x7f0000000240)='./file0\x00', 0x0) 14:37:46 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:46 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:46 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x1fffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) write$P9_RLOPEN(r0, &(0x7f00000003c0)={0x18, 0xd, 0x1, {{0xb0, 0x3}}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f00000008c0)="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", &(0x7f00000009c0)=""/167}, 0x18) io_setup(0x2, &(0x7f0000000100)=0x0) io_getevents(r2, 0x800000000000009, 0x2, &(0x7f0000000580)=[{}, {}], 0x0) sendto(r1, &(0x7f0000000880)="c5", 0x1, 0x4000051, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x0, @pix={0x0, 0x0, 0x37303250, 0xb, 0xffffffffffffffe0, 0x8, 0xb, 0x2, 0x1, 0x6, 0x1, 0x7}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast1}}, [0x5, 0x4, 0x81, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x1, 0x0, 0x7fff, 0x2, 0x2, 0xd14b, 0x7ff]}, &(0x7f0000000500)=0x100) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000380)) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x101) getrandom(&(0x7f00000005c0)=""/198, 0xfffffffffffffeb0, 0x3) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x4, 0x2, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x9}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r4, &(0x7f0000000740)=""/197}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000840)={r3, 0x7}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 14:37:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, 0x0, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:46 executing program 0: r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:46 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x1fffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) write$P9_RLOPEN(r0, &(0x7f00000003c0)={0x18, 0xd, 0x1, {{0xb0, 0x3}}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f00000008c0)="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", &(0x7f00000009c0)=""/167}, 0x18) io_setup(0x2, &(0x7f0000000100)=0x0) io_getevents(r2, 0x800000000000009, 0x2, &(0x7f0000000580)=[{}, {}], 0x0) sendto(r1, &(0x7f0000000880)="c5", 0x1, 0x4000051, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x0, @pix={0x0, 0x0, 0x37303250, 0xb, 0xffffffffffffffe0, 0x8, 0xb, 0x2, 0x1, 0x6, 0x1, 0x7}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast1}}, [0x5, 0x4, 0x81, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x1, 0x0, 0x7fff, 0x2, 0x2, 0xd14b, 0x7ff]}, &(0x7f0000000500)=0x100) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000380)) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x101) getrandom(&(0x7f00000005c0)=""/198, 0xfffffffffffffeb0, 0x3) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x4, 0x2, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x9}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r4, &(0x7f0000000740)=""/197}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000840)={r3, 0x7}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 14:37:47 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:47 executing program 0: r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:47 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x1fffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) write$P9_RLOPEN(r0, &(0x7f00000003c0)={0x18, 0xd, 0x1, {{0xb0, 0x3}}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f00000008c0)="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", &(0x7f00000009c0)=""/167}, 0x18) io_setup(0x2, &(0x7f0000000100)=0x0) io_getevents(r2, 0x800000000000009, 0x2, &(0x7f0000000580)=[{}, {}], 0x0) sendto(r1, &(0x7f0000000880)="c5", 0x1, 0x4000051, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x0, @pix={0x0, 0x0, 0x37303250, 0xb, 0xffffffffffffffe0, 0x8, 0xb, 0x2, 0x1, 0x6, 0x1, 0x7}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast1}}, [0x5, 0x4, 0x81, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x1, 0x0, 0x7fff, 0x2, 0x2, 0xd14b, 0x7ff]}, &(0x7f0000000500)=0x100) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000380)) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x101) getrandom(&(0x7f00000005c0)=""/198, 0xfffffffffffffeb0, 0x3) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x4, 0x2, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x9}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r4, &(0x7f0000000740)=""/197}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000840)={r3, 0x7}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 14:37:47 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x1fffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) write$P9_RLOPEN(r0, &(0x7f00000003c0)={0x18, 0xd, 0x1, {{0xb0, 0x3}}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f00000008c0)="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", &(0x7f00000009c0)=""/167}, 0x18) io_setup(0x2, &(0x7f0000000100)=0x0) io_getevents(r2, 0x800000000000009, 0x2, &(0x7f0000000580)=[{}, {}], 0x0) sendto(r1, &(0x7f0000000880)="c5", 0x1, 0x4000051, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x0, @pix={0x0, 0x0, 0x37303250, 0xb, 0xffffffffffffffe0, 0x8, 0xb, 0x2, 0x1, 0x6, 0x1, 0x7}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast1}}, [0x5, 0x4, 0x81, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x1, 0x0, 0x7fff, 0x2, 0x2, 0xd14b, 0x7ff]}, &(0x7f0000000500)=0x100) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000380)) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x101) getrandom(&(0x7f00000005c0)=""/198, 0xfffffffffffffeb0, 0x3) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x4, 0x2, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x9}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r4, &(0x7f0000000740)=""/197}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000840)={r3, 0x7}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 14:37:47 executing program 3: r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:47 executing program 1: 14:37:47 executing program 3: r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:47 executing program 0: r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) [ 1344.171225][T32685] IPVS: ftp: loaded support on port[0] = 21 14:37:47 executing program 4: 14:37:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, 0x0, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:47 executing program 1: 14:37:47 executing program 3: r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:47 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x1fffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x100000000000006) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) write$P9_RLOPEN(r0, &(0x7f00000003c0)={0x18, 0xd, 0x1, {{0xb0, 0x3}}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f00000008c0)="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", &(0x7f00000009c0)=""/167}, 0x18) io_setup(0x2, &(0x7f0000000100)=0x0) io_getevents(r2, 0x800000000000009, 0x2, &(0x7f0000000580)=[{}, {}], 0x0) sendto(r1, &(0x7f0000000880)="c5", 0x1, 0x4000051, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x0, @pix={0x0, 0x0, 0x37303250, 0xb, 0xffffffffffffffe0, 0x8, 0xb, 0x2, 0x1, 0x6, 0x1, 0x7}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast1}}, [0x5, 0x4, 0x81, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x1, 0x0, 0x7fff, 0x2, 0x2, 0xd14b, 0x7ff]}, &(0x7f0000000500)=0x100) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000380)) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x101) getrandom(&(0x7f00000005c0)=""/198, 0xfffffffffffffeb0, 0x3) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x4, 0x2, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x9}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r4, &(0x7f0000000740)=""/197}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000840)={r3, 0x7}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 14:37:47 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xfffffffffffffff9, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='/dev/kvm\x00', 0x9, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xcd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}]}, 0x18, 0x0) execve(0x0, &(0x7f00000006c0)=[0x0, &(0x7f0000000600)='secur\\ty.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:37:47 executing program 0: symlink(0x0, &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:48 executing program 3: symlink(0x0, &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:48 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffc4b) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000000), 0xa) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) prctl$PR_SET_TSC(0x1a, 0x3) memfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RLOCK(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) 14:37:48 executing program 0: symlink(0x0, &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) [ 1344.862859][T32748] IPVS: ftp: loaded support on port[0] = 21 14:37:48 executing program 5: 14:37:48 executing program 3: symlink(0x0, &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:48 executing program 5: 14:37:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, 0x0, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:48 executing program 0: symlink(0x0, &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:48 executing program 3: symlink(0x0, &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:48 executing program 5: 14:37:48 executing program 4: 14:37:49 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:49 executing program 5: [ 1345.858454][ T503] IPVS: ftp: loaded support on port[0] = 21 14:37:49 executing program 4: 14:37:49 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:49 executing program 5: 14:37:49 executing program 1: 14:37:49 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:49 executing program 1: 14:37:49 executing program 4: 14:37:49 executing program 5: 14:37:49 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:49 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:49 executing program 1: 14:37:49 executing program 4: 14:37:49 executing program 5: 14:37:49 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(0x0, 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) [ 1346.652630][ T632] IPVS: ftp: loaded support on port[0] = 21 14:37:50 executing program 1: 14:37:50 executing program 4: 14:37:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:50 executing program 5: 14:37:50 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(0x0, 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:50 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:50 executing program 1: 14:37:50 executing program 4: 14:37:50 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x3, {0xdd}}, 0x18) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) lsetxattr$security_selinux(0x0, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:37:50 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(0x0, 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x400000, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xc, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 14:37:50 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(0x0, 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:50 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(0x0, 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) [ 1347.353729][ T661] IPVS: ftp: loaded support on port[0] = 21 14:37:50 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a00)=ANY=[@ANYBLOB="141d0f34b57f074919fe168dfb1f25a645f716e7d2bfeffa9554a08f491683d8ed8c910a20975e8a475c5df1f5009a6c856f480a2dc4a593addd9b0a31e6"], 0x3e}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:37:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r6, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:51 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(0x0, 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:51 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x400000, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xc, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 14:37:51 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) 14:37:51 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:51 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$evdev(r0, &(0x7f00000001c0)=[{}], 0x18) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) [ 1348.503523][ T908] IPVS: ftp: loaded support on port[0] = 21 14:37:51 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:52 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:52 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:52 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) lsetxattr$security_selinux(0x0, &(0x7f0000000400)='security.selinux\x00', 0x0, 0x0, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:37:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:52 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:52 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) [ 1349.142782][ T1075] IPVS: ftp: loaded support on port[0] = 21 14:37:52 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe07bf070") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) 14:37:52 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:53 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) 14:37:53 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x1) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 14:37:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:53 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, 0x0, &(0x7f0000000180)=""/175, 0xaf) 14:37:53 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, 0x0, &(0x7f0000000180)=""/175, 0xaf) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') syz_open_dev$adsp(0x0, 0x0, 0x2) 14:37:53 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, 0x0, &(0x7f0000000180)=""/175, 0xaf) 14:37:57 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe07bf070") syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) 14:37:57 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, 0x0, &(0x7f0000000180)=""/175, 0xaf) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:57 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x0, 0x0, 0xa6}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 14:37:57 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, 0x0, &(0x7f0000000180)=""/175, 0xaf) 14:37:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') syz_open_dev$adsp(0x0, 0x0, 0x2) 14:37:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:57 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, 0x0, &(0x7f0000000180)=""/175, 0xaf) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:57 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 14:37:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') syz_open_dev$adsp(0x0, 0x0, 0x2) [ 1354.084039][ T1552] IPVS: ftp: loaded support on port[0] = 21 14:37:57 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 14:37:57 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:57 executing program 0: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) 14:37:59 executing program 5: 14:37:59 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 14:37:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x0, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:59 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:59 executing program 0: [ 1356.199405][ T1908] IPVS: ftp: loaded support on port[0] = 21 14:37:59 executing program 0: 14:37:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0x0, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00), 0x0, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000100)={{0x0}, &(0x7f0000000080), 0x15}, 0x20) 14:37:59 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', 0x0, 0x0) readlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=""/126, 0x7e) 14:37:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:37:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x0, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:37:59 executing program 0: ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='oom_score\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) timer_create(0x0, 0x0, &(0x7f00000001c0)) 14:37:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd14", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1356.670776][ T2007] IPVS: ftp: loaded support on port[0] = 21 14:38:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(0x0, &(0x7f0000000040)=""/126, 0x7e) 14:38:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(0x0, &(0x7f0000000040)=""/126, 0x7e) 14:38:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 4: 14:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd14", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x0, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:38:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 0: 14:38:00 executing program 4: 14:38:00 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(0x0, &(0x7f0000000040)=""/126, 0x7e) 14:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:00 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) 14:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd14", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003580)=""/167, 0xa7}, {&(0x7f0000003700)=""/48, 0x30}, {&(0x7f0000003840)=""/52, 0x34}, {0x0}], 0x4, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, 0x0) r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1357.602643][ T2179] IPVS: ftp: loaded support on port[0] = 21 14:38:00 executing program 0: 14:38:00 executing program 4: 14:38:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000004980)=[{0x0}, {&(0x7f0000003640)=""/129, 0x81}, {&(0x7f0000003700)=""/48, 0x30}, {0x0}, {&(0x7f0000003940)=""/4096, 0x1000}], 0x5, &(0x7f0000004a00)=""/217, 0xd9}}], 0x1, 0x100, &(0x7f0000004c00)={0x77359400}) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x0, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:38:01 executing program 0: 14:38:01 executing program 4: 14:38:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:01 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) 14:38:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:01 executing program 0: 14:38:01 executing program 4: 14:38:01 executing program 3: symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000240)='./file1\x00') r0 = open(&(0x7f0000000140)='./file1\x00', 0x222800, 0x0) readlinkat(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000180)=""/175, 0x6) readlink(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) 14:38:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd14", 0x23b, r2) keyctl$read(0x3, r3, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:01 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1358.514770][ T2217] IPVS: ftp: loaded support on port[0] = 21 14:38:01 executing program 4: 14:38:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x0, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:38:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x23b, r2) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:02 executing program 4: 14:38:02 executing program 0: 14:38:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x6c, 0x2c00, 0x0, 0x0, 0x6c, 0x0, 0x3fc]}, 0x0, r1}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x1, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) 14:38:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:02 executing program 4: 14:38:02 executing program 0: 14:38:02 executing program 4: 14:38:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1359.209307][ T2248] IPVS: ftp: loaded support on port[0] = 21 14:38:02 executing program 0: 14:38:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x0, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:38:03 executing program 4: 14:38:03 executing program 0: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2cca0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)=':', 0x1}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="400000000600000000000000000000000000000000000000058063b7"], 0x1c) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x6c, 0x2c00, 0x0, 0x0, 0x6c, 0x0, 0x3fc]}, 0x0, r1}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x1, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) 14:38:03 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c400f05"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") clone(0x100000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000000)='./file0\x00', 0x200ff7, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 1359.993583][ T2380] IPVS: ftp: loaded support on port[0] = 21 14:38:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x6c, 0x2c00, 0x0, 0x0, 0x6c, 0x0, 0x3fc]}, 0x0, r1}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x1, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) 14:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x0, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 14:38:03 executing program 4: getpgid(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x1ae) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x10, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x30) fcntl$setstatus(r1, 0x4, 0x42803) 14:38:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:03 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x2) 14:38:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x6c, 0x2c00, 0x0, 0x0, 0x6c, 0x0, 0x3fc]}, 0x0, r1}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x1, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) 14:38:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e0bcfe87b0071") r1 = syz_open_procfs(0x0, &(0x7f0000000140)='map_files\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, &(0x7f0000002100)=""/4096, 0x32b) getdents64(r1, 0x0, 0x0) [ 1360.800293][ T2529] IPVS: ftp: loaded support on port[0] = 21 14:38:04 executing program 5: syz_open_dev$adsp(0x0, 0x7, 0x2) 14:38:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 14:38:04 executing program 5: syz_open_dev$adsp(0x0, 0x7, 0x2) 14:38:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x28) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) 14:38:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x32, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x20000000037) getsockopt$inet6_opts(r1, 0x29, 0x3b, 0x0, &(0x7f0000000100)) dup3(r1, 0xffffffffffffffff, 0x80000) getgroups(0x0, 0x0) 14:38:04 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) 03:33:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x0, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:20 executing program 5: syz_open_dev$adsp(0x0, 0x7, 0x2) 03:33:20 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x201e}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@dev, 0x0, r3}) 03:33:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:20 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x600000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @broadcast}, 0x10) close(r0) 03:33:20 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x2) [ 1361.636272][ T2920] IPVS: ftp: loaded support on port[0] = 21 03:33:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000180)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, 0x0) [ 1361.716782][ T3085] device lo entered promiscuous mode [ 1361.722965][ T3085] device lo left promiscuous mode 03:33:20 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x131}], 0x4}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x100000034) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:33:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') keyctl$read(0x3, 0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r3 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:20 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x2) 03:33:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x340, 0x0) [ 1362.086372][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1362.092252][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:33:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') keyctl$read(0x3, 0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r3 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x0, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:20 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffff5a}, 0x0) creat(0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, 0x0) syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 03:33:20 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x2) 03:33:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r1, &(0x7f0000005780), 0x4000000000000d2, 0x0) 03:33:21 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x0) 03:33:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1b) r2 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12}, &(0x7f0000000180)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x15) 03:33:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') keyctl$read(0x3, 0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r3 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1362.511375][ T3485] IPVS: ftp: loaded support on port[0] = 21 03:33:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x65}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:33:21 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{0x77359400}}, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/235, 0xeb}], 0x1) clock_settime(0x0, 0x0) 03:33:21 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x0) 03:33:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x0, 0xff, 0x1}, 0x20) 03:33:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, 0x0, &(0x7f0000000240)) 03:33:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00'}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:21 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x0) 03:33:21 executing program 0: clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000080)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/158, 0x9e}], 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/6, 0x6}], 0x1, 0x0) 03:33:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:21 executing program 4: clone(0x201, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, 0x0) 03:33:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x538) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) accept4$inet(r2, 0x0, 0x0, 0x0) 03:33:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r4 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r4, 0x0, 0x28e, 0x80020003ffc, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) [ 1363.420120][ T4202] IPVS: ftp: loaded support on port[0] = 21 03:33:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000e0ff850014aa783c00009500000000000000"], &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x2, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:33:22 executing program 0: io_setup(0x0, &(0x7f0000000680)) socket$bt_hidp(0x1f, 0x3, 0x6) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getpgrp(0xffffffffffffffff) keyctl$read(0xb, 0x0, &(0x7f0000000580)=""/76, 0x4c) sync_file_range(0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffffc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000280)={0x0, 0x4, 0x2}) mkdir(&(0x7f0000000300)='./file0\x00', 0x10) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0x5, 0xbdf6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10811, r0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000480)={0x5, 0xeb, 0x5}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x8000, 0x10000, 0x5, 0x8}, 0x7, [0x7fffffff, 0xe719, 0x3, 0x1, 0x8, 0x8, 0x80000000, 0xe4f, 0xc, 0x94, 0x100, 0x2, 0x3, 0x0, 0x67f, 0x72c, 0x3f, 0x3f, 0x526bff2e, 0xfffffffffffffffe, 0x20, 0xffffffff, 0x1, 0x101, 0x0, 0x1ff, 0xd985, 0x100, 0x45, 0x401, 0x1fffe, 0x10000, 0x0, 0x6, 0x101, 0x0, 0x4, 0x9, 0x1000, 0x10000, 0xfa0, 0x695, 0xf8, 0xfffffffffffff755, 0x4, 0x9, 0x7e2c, 0x4, 0x5, 0x4, 0x1, 0x9, 0x101, 0x8, 0x2, 0x1, 0x1907fef2, 0x3, 0x3f, 0x8, 0x822c, 0xd42, 0x10000], [0x0, 0x101, 0x8, 0x20, 0x800, 0xfff, 0xe00000000, 0x6f7b, 0x1f, 0x10, 0x1, 0x3d5c, 0x0, 0x2, 0x8, 0x3, 0x40, 0x5, 0x8dee, 0x10000, 0x5, 0x9, 0x8, 0x5, 0x101, 0x2, 0xffff, 0xb4, 0x5, 0xf7b7, 0x0, 0x5, 0x81, 0x65, 0x1, 0x7, 0x56b, 0x100, 0x2, 0x0, 0x0, 0xff, 0x3, 0x7, 0xe08, 0x5, 0x9, 0x5, 0xdcc, 0xfffffffffffffffe, 0x1000, 0x8, 0x4, 0x4f, 0x5, 0x1, 0x200, 0x8, 0x200, 0x0, 0x80000001, 0x6, 0x100000001, 0xffffffffffff15d0], [0x0, 0x9, 0x4, 0x0, 0x8, 0x3ff, 0x9, 0x3f, 0x6, 0x8001, 0x0, 0x8, 0x8001, 0x6, 0x3, 0x8, 0x5, 0x2, 0x5, 0x7, 0x4, 0x4, 0x100000001, 0x4, 0x0, 0x0, 0x0, 0x3, 0x8000, 0x200, 0x7, 0x6, 0x446, 0x81, 0x1, 0x8, 0x10000, 0xf4d0, 0x7413eee9, 0xbd, 0x1000, 0xfffffffffffffff9, 0x4, 0x1, 0x8000, 0x55d, 0x8, 0x9, 0x0, 0x6, 0x0, 0xeff4, 0x35, 0x7, 0x264, 0x5, 0x7, 0x5, 0x7, 0x100000000, 0x0, 0x1, 0x5, 0x7ff], [0x8, 0x7f, 0xfff, 0x9, 0x0, 0x8, 0x5, 0x8, 0x1, 0x8, 0x3, 0x8, 0x5e1, 0x1, 0x6, 0x2, 0xff, 0x8, 0x101, 0xd6, 0x101, 0x100000000, 0x9, 0x524c, 0x6, 0x7, 0x4, 0x692c, 0xfffffffffffffbcc, 0x19db1fe9, 0x1, 0x6, 0x6, 0x100000001, 0x4, 0x2, 0x1, 0x15, 0x5, 0x0, 0x101, 0x0, 0x2, 0x7f, 0x0, 0x80000001, 0x100, 0x3, 0x800, 0x3, 0x36d, 0x3, 0x200, 0xa5, 0x8, 0x7, 0x1, 0x9, 0x5, 0x3ff, 0x9, 0x24f, 0x8000, 0x400]}, 0x45c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x20, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) set_robust_list(&(0x7f0000000180)={&(0x7f00000002c0)={&(0x7f00000001c0)}}, 0x18) 03:33:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00'}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:22 executing program 3: io_setup(0x0, &(0x7f0000000680)) socket$bt_hidp(0x1f, 0x3, 0x6) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getpgrp(0xffffffffffffffff) keyctl$read(0xb, 0x0, &(0x7f0000000580)=""/76, 0x4c) sync_file_range(0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffffc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000280)={0x0, 0x4}) mkdir(&(0x7f0000000300)='./file0\x00', 0x10) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0x5, 0xbdf6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000006c0)={'syz0\x00', {0x8000, 0x10000, 0x5, 0x8}, 0x7, [0x7fffffff, 0xe719, 0x3, 0x1, 0x8, 0x8, 0x80000000, 0xe4f, 0xc, 0x94, 0x100, 0x2, 0x3, 0x0, 0x67f, 0x72c, 0x3f, 0x3f, 0x526bff2e, 0xfffffffffffffffe, 0x20, 0xffffffff, 0x1, 0x101, 0x0, 0x1ff, 0xd985, 0x100, 0x45, 0x401, 0x1fffe, 0x10000, 0x0, 0x6, 0x101, 0x0, 0x4, 0x9, 0x1000, 0x10000, 0xfa0, 0x695, 0xf8, 0xfffffffffffff755, 0x4, 0x9, 0x7e2c, 0x4, 0x5, 0x4, 0x1, 0x9, 0x101, 0x8, 0x2, 0x1, 0x1907fef2, 0x3, 0x3f, 0x8, 0x822c, 0xd42, 0x10000], [0x0, 0x101, 0x8, 0x20, 0x800, 0xfff, 0xe00000000, 0x6f7b, 0x1f, 0x10, 0x1, 0x3d5c, 0x0, 0x2, 0x8, 0x3, 0x40, 0x5, 0x8dee, 0x10000, 0x5, 0x9, 0x8, 0x5, 0x101, 0x2, 0xffff, 0xb4, 0x5, 0xf7b7, 0x0, 0x5, 0x81, 0x65, 0x1, 0x7, 0x56b, 0x100, 0x2, 0x0, 0x0, 0xff, 0x3, 0x7, 0xe08, 0x5, 0x9, 0x5, 0xdcc, 0xfffffffffffffffe, 0x1000, 0x8, 0x4, 0x4f, 0x5, 0x1, 0x200, 0x8, 0x200, 0x0, 0x80000001, 0x6, 0x100000001, 0xffffffffffff15d0], [0x0, 0x9, 0x4, 0x0, 0x8, 0x3ff, 0x9, 0x3f, 0x6, 0x8001, 0x0, 0x8, 0x8001, 0x6, 0x3, 0x8, 0x5, 0x2, 0x5, 0x7, 0x4, 0x4, 0x100000001, 0x4, 0x8000, 0x0, 0x0, 0x3, 0x8000, 0x200, 0x7, 0x6, 0x446, 0x81, 0x1, 0x8, 0x10000, 0xf4d0, 0x7413eee9, 0xbd, 0x1000, 0xfffffffffffffff9, 0x4, 0x1, 0x8000, 0x55d, 0x8, 0x9, 0x0, 0x6, 0x0, 0xeff4, 0x35, 0x7, 0x264, 0x5, 0x7, 0x5, 0x7, 0x100000000, 0x0, 0x1, 0x5, 0x7ff], [0x8, 0x7f, 0xfff, 0x9, 0x3, 0x8, 0x5, 0x8, 0x1, 0x8, 0x3, 0x8, 0x5e1, 0x1, 0x6, 0x2, 0xff, 0x8, 0x101, 0xd6, 0x101, 0x100000000, 0x9, 0x524c, 0x6, 0x7, 0x4, 0x692c, 0xfffffffffffffbcc, 0x19db1fe9, 0x1, 0x6, 0x6, 0x100000001, 0x4, 0x2, 0x1, 0x15, 0x5, 0x0, 0x101, 0x0, 0x2, 0x7f, 0x0, 0x80000001, 0x100, 0x3, 0x800, 0x3, 0x36d, 0x3, 0x200, 0xa5, 0x8, 0x7, 0x1, 0x9, 0x5, 0x3ff, 0x9, 0x24f, 0x8000, 0x400]}, 0x45c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x20, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) set_robust_list(&(0x7f0000000180)={&(0x7f00000002c0)={&(0x7f00000001c0)}}, 0x18) 03:33:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1364.362950][ T4265] cgroup: fork rejected by pids controller in /syz5 03:33:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, 0x0) keyctl$read(0x3, r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r3 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1364.584124][ T4806] IPVS: ftp: loaded support on port[0] = 21 03:33:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000015c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 03:33:23 executing program 0: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x85e2}, 0x28, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000940)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000540)={0x4, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x1f}, 0x2}}, 0x0, 0x5, [{{0xa, 0x4e21, 0x71, @remote, 0x4}}, {{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x22}, 0x8}}, {{0xa, 0x4e21, 0xffffffffffffe76e, @rand_addr="c107139e2511d2aba1b5f5b8374b8c0a", 0x3}}, {{0xa, 0x4e24, 0xb2, @mcast1, 0x251d}}, {{0xa, 0x4e23, 0x1, @empty, 0xffffffff00000000}}]}, 0x310) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = msgget$private(0x0, 0x80) msgctl$IPC_RMID(r3, 0x0) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) sendto$inet6(r4, 0x0, 0xffffffffffffffd1, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x400000000004e22}, 0x1c) close(r4) 03:33:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x6) [ 1364.845705][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, 0x0) keyctl$read(0x3, r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r3 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)='F', 0x1, r1) keyctl$read(0x3, r2, 0x0, 0x0) 03:33:23 executing program 0: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="640ff24101660f08f20f1bfa0f20e06635000040000f22e0bad004b00fee36260f01dfaa8fc900010b0f080f005b9a", 0x2f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r1 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, 0x0) keyctl$read(0x3, r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r3 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x40000000000000a, 0x801, 0x3}, 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) 03:33:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00'}, 0x3, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000200)="b9800000c00f3235000100000f3048b8568b929eb42e3b020f23c00f21f835010003000f23f8440f01ca66b858008ec00f20d835200000000f22d866bad004ec650f01cf66baf80cb8bb6e038fef66bafc0cec363e450f3066b85e008ed8"}], 0x8b, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1040000004, 0x0, 0x0, 0x0, 0x4cc]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:33:23 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") getpeername$llc(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10) 03:33:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1365.498239][ T5435] IPVS: ftp: loaded support on port[0] = 21 03:33:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000003300070100000000400000e002000000ffd38d9b080001000400070004000800"], 0x24}}, 0x0) 03:33:24 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1}}}, 0x101, 0x7, 0x80000000}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 03:33:24 executing program 3: sysfs$2(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x4}}, 0x3ff, 0x7, 0x6, 0x4, 0xda}, &(0x7f0000000380)=0x98) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000200)={{0x0, 0x6}, {0x1, 0x10001}, 0x0, 0x0, 0x200}) syz_open_dev$swradio(0x0, 0x1, 0x2) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) connect$pptp(r0, &(0x7f0000000480)={0x18, 0x2, {0x1, @remote}}, 0x1e) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 03:33:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000200)="b9800000c00f3235000100000f3048b8568b929eb42e3b020f23c00f21f835010003000f23f8440f01ca66b858008ec00f20d835200000000f22d866bad004ec650f01cf66baf80cb8bb6e038fef66bafc0cec363e450f3066b85e008ed8"}], 0x8b, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1040000004, 0x0, 0x0, 0x0, 0x4cc]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1366.099011][ T5800] QAT: Invalid ioctl [ 1366.122327][ T5800] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.130529][ T5800] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.139514][ T5800] device bridge0 left promiscuous mode 03:33:24 executing program 0: getpgrp(0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='=roc\x00']) 03:33:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x0, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)='F', 0x1, r1) keyctl$read(0x3, r2, 0x0, 0x0) [ 1366.617925][ T6139] IPVS: ftp: loaded support on port[0] = 21 03:33:25 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 03:33:25 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:25 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)='F', 0x1, r1) keyctl$read(0x3, r2, 0x0, 0x0) 03:33:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) getsockopt(r1, 0x0, 0xd0, 0x0, 0x0) 03:33:26 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:26 executing program 0: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000002c0)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000000)="6c14dcc517df", 0x0, 0x0, 0x0, 0x0, 0x0}) 03:33:26 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x800) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='cgroup.stat\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00', r1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x20004844) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 1367.926407][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1367.932319][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1367.938291][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1367.944143][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:33:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x0, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x6800000000000000, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 03:33:27 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:27 executing program 3: sysfs$2(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21}}, 0x3ff, 0x7, 0x6, 0x4, 0xda}, &(0x7f0000000380)=0x98) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000200)={{0x0, 0x6}, {0x1, 0x10001}, 0x0, 0x0, 0x200}) syz_open_dev$swradio(0x0, 0x1, 0x2) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) connect$pptp(r0, &(0x7f0000000480)={0x18, 0x2, {0x1, @remote}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 03:33:27 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x800) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='cgroup.stat\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00', r1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x20004844) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 03:33:27 executing program 0: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000002c0)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000000)="6c14dcc517df", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1369.119132][ T6680] QAT: Invalid ioctl [ 1369.131960][ T6680] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.139468][ T6680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1369.148095][ T6680] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.155679][ T6680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1369.165605][ T6680] device bridge0 entered promiscuous mode [ 1369.179104][ T1394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:33:27 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:27 executing program 0: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000002c0)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000000)="6c14dcc517df92266c61d9a72edf605cc2", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1369.382632][ T6690] IPVS: ftp: loaded support on port[0] = 21 03:33:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) get_robust_list(0x0, 0x0, &(0x7f0000000700)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="640ff24101660f08f20f1bfa0f20e06635000040000f22e0bad004b00fee36260f01dfaa8fc900010b0f080f005b9a", 0x2f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x800) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:28 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x4) ioctl$sock_ifreq(r0, 0x2, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00\x00\x00L'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x14\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891a, 0x0) 03:33:28 executing program 3: sysfs$2(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21}}, 0x3ff, 0x7, 0x6, 0x4, 0xda}, &(0x7f0000000380)=0x98) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000200)={{0x0, 0x6}, {0x1, 0x10001}, 0x0, 0x0, 0x200}) syz_open_dev$swradio(0x0, 0x1, 0x2) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) connect$pptp(r0, &(0x7f0000000480)={0x18, 0x2, {0x1, @remote}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 1369.927133][ T6999] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:33:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x0, 0x40, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x6800000000000000, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 03:33:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) get_robust_list(0x0, 0x0, &(0x7f0000000700)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="640ff24101660f08f20f1bfa0f20e06635000040000f22e0bad004b00fee36260f01dfaa8fc900010b0f080f005b9a", 0x2f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x800) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1370.277056][ T7302] IPVS: ftp: loaded support on port[0] = 21 03:33:28 executing program 3: sysfs$2(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21}}, 0x3ff, 0x7, 0x6, 0x4, 0xda}, &(0x7f0000000380)=0x98) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000200)={{0x0, 0x6}, {0x1, 0x10001}, 0x0, 0x0, 0x200}) syz_open_dev$swradio(0x0, 0x1, 0x2) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, 0x0) connect$pptp(r0, &(0x7f0000000480)={0x18, 0x2, {0x1, @remote}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 03:33:29 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x4}, 0x28) 03:33:29 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x800) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x801, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) r1 = gettid() sched_setaffinity(r1, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x6) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 03:33:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1370.587707][ T7327] QAT: Invalid ioctl 03:33:29 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x5, 0x0, 0x10b}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a00)=ANY=[@ANYBLOB="141d0f34b57f074919fe168dfb1f25a645f716e7d2bfeffa9554a08f491683d8ed8c910a20975e8a475c5df1f5009a6c856f480a2dc4a593addd9b0a31e6e31bef0687ef16e7c726ea4fe09e605637dac9fff8a2"], 0x54}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:33:29 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$rfkill(r0, 0x0, 0x0) 03:33:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x0, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:29 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchmod(r0, 0x0) 03:33:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) 03:33:29 executing program 5: sysfs$2(0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000200)={{0x6}, {0x1, 0x10001}, 0xffffffffffffff84, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x141, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 03:33:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:29 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x202100, 0x2) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000001c0)={0x7, 0xf, 0x4, 0x0, {0x77359400}, {0x1, 0xe, 0x0, 0x0, 0x6, 0x0, "7b4fbbcc"}, 0x2c6e39ec, 0x7, @offset=0x8933, 0x4}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) fchdir(r0) add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000440)="3680266775db65646fe57c3ee9a8a78f55d5631897d5d727d383abbbe4e6fc5a71aef92c44690a3aded177d99ade55499adaa9b3025d7b2034301defa78cac401137ecd943a8fc1bcd370edba44e5acb87", 0x51, 0xfffffffffffffff9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x0) [ 1371.281391][ T7394] Ûÿ: renamed from bridge0 [ 1371.289768][ T7389] IPVS: ftp: loaded support on port[0] = 21 03:33:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:29 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 040'], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000000)="86", 0x1) 03:33:30 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchmod(r0, 0x0) 03:33:30 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x800) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x801, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) r1 = gettid() sched_setaffinity(r1, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uname(&(0x7f00000002c0)=""/4) getpgrp(0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x6) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 03:33:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:30 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x800) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x801, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) r1 = gettid() sched_setaffinity(r1, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uname(&(0x7f00000002c0)=""/4) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 03:33:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x0, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:30 executing program 5: 03:33:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000010000009500000000001d395e9decf70299c67dd3fcc8cba8d59017e336be980477e54584085b5675e0963fd27484e01f80da24ad6f13959610fc75a02b6f454aab3e6ff0a9c39d9a8969dd1f2d29b8ee3988ca677ebcb9997132d789db6f00"/127], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:33:30 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchmod(r0, 0x0) 03:33:30 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x800) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x801, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) r1 = gettid() sched_setaffinity(r1, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uname(&(0x7f00000002c0)=""/4) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x6) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 03:33:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) [ 1372.365842][ T8034] IPVS: ftp: loaded support on port[0] = 21 03:33:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x84000) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000040)) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000140)={[{0x85, 0x1000, 0x3, 0x0, 0x0, 0x101, 0x2, 0xd881, 0x401, 0x3, 0x97, 0x1f4, 0x3}, {0x8, 0x8, 0x8001, 0x9, 0x81, 0x3a5, 0xabf0, 0x7, 0x1, 0x4, 0x401, 0x8, 0xfffffffffffffff8}, {0x8, 0xffffffffffff0001, 0x2, 0x5, 0x2, 0x7, 0x2, 0x4, 0x7, 0x9, 0x5, 0x4, 0x3f}], 0x6}) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00\x00\x00L'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x14\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891a, 0x0) 03:33:31 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)=0x6) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 03:33:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:31 executing program 0: 03:33:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x0, 0x10001, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:34 executing program 4: 03:33:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:34 executing program 3: 03:33:34 executing program 0: 03:33:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:34 executing program 3: 03:33:34 executing program 4: 03:33:34 executing program 0: 03:33:34 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1375.798330][ T8370] IPVS: ftp: loaded support on port[0] = 21 03:33:34 executing program 4: 03:33:34 executing program 0: 03:33:34 executing program 3: 03:33:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:34 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x0, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:34 executing program 4: 03:33:34 executing program 0: 03:33:34 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:34 executing program 4: 03:33:35 executing program 3: 03:33:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1376.465006][ T8400] IPVS: ftp: loaded support on port[0] = 21 03:33:35 executing program 0: 03:33:35 executing program 5: ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:35 executing program 4: 03:33:35 executing program 3: 03:33:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x0, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:35 executing program 0: 03:33:35 executing program 5: r0 = syz_open_dev$video(0x0, 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:35 executing program 4: 03:33:35 executing program 3: 03:33:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:35 executing program 0: 03:33:35 executing program 3: 03:33:35 executing program 5: r0 = syz_open_dev$video(0x0, 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:35 executing program 4: 03:33:35 executing program 0: [ 1377.365591][ T8442] IPVS: ftp: loaded support on port[0] = 21 03:33:36 executing program 0: 03:33:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x0, r7, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:36 executing program 4: 03:33:36 executing program 5: r0 = syz_open_dev$video(0x0, 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:36 executing program 3: 03:33:36 executing program 0: 03:33:36 executing program 3: [ 1377.888214][ T8468] IPVS: ftp: loaded support on port[0] = 21 03:33:36 executing program 4: 03:33:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@local, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, 0xe8) 03:33:36 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:36 executing program 3: 03:33:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, 0x0, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:37 executing program 4: 03:33:37 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:37 executing program 3: 03:33:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@local, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, 0xe8) 03:33:37 executing program 4: 03:33:37 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:37 executing program 3: 03:33:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:37 executing program 4: 03:33:37 executing program 0: [ 1378.642750][ T8698] IPVS: ftp: loaded support on port[0] = 21 03:33:37 executing program 3: 03:33:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:37 executing program 4: 03:33:37 executing program 0: 03:33:37 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:37 executing program 3: 03:33:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, 0x0, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:37 executing program 0: 03:33:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:37 executing program 4: 03:33:37 executing program 3: [ 1379.444766][ T8731] IPVS: ftp: loaded support on port[0] = 21 03:33:38 executing program 4: 03:33:38 executing program 0: 03:33:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, 0x0, 0x4, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:38 executing program 0: 03:33:38 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', 0x0, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:38 executing program 3: 03:33:38 executing program 4: 03:33:38 executing program 4: 03:33:38 executing program 3: 03:33:38 executing program 0: 03:33:38 executing program 5: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140, 0xb4}) 03:33:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', 0x0, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:38 executing program 4: [ 1380.246943][ T8763] IPVS: ftp: loaded support on port[0] = 21 03:33:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x0, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:39 executing program 4: 03:33:39 executing program 0: 03:33:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, 0x0) 03:33:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', 0x0, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:39 executing program 3: 03:33:39 executing program 3: 03:33:39 executing program 0: 03:33:39 executing program 4: 03:33:39 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, 0x0) 03:33:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1380.953234][ T8791] IPVS: ftp: loaded support on port[0] = 21 03:33:39 executing program 4: 03:33:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x0, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, 0x0) 03:33:40 executing program 0: 03:33:40 executing program 3: 03:33:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:40 executing program 4: 03:33:40 executing program 4: 03:33:40 executing program 3: 03:33:40 executing program 0: 03:33:40 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1381.676492][ T8825] IPVS: ftp: loaded support on port[0] = 21 03:33:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0x0, 0x32315659, 0x140, 0xb4}) 03:33:40 executing program 4: 03:33:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x4, 0x0, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00', 'security.evm\x00'], 0x3d, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:40 executing program 0: 03:33:40 executing program 3: 03:33:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0x0, 0x32315659, 0x140, 0xb4}) 03:33:40 executing program 4: 03:33:40 executing program 3: 03:33:40 executing program 4: 03:33:40 executing program 0: 03:33:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:40 executing program 3: 03:33:40 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0x0, 0x32315659, 0x140, 0xb4}) [ 1382.452723][ T8856] IPVS: ftp: loaded support on port[0] = 21 03:33:41 executing program 3: 03:33:41 executing program 0: 03:33:41 executing program 4: 03:33:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x0, 0x140, 0xb4}) 03:33:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='\x00') r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r1) keyctl$read(0x3, r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r4 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x0, 0x4, 'syz1\x00', 0x0, 0x0, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:41 executing program 3: 03:33:41 executing program 4: 03:33:41 executing program 0: 03:33:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x0, 0x140, 0xb4}) [ 1383.207767][ T9020] IPVS: ftp: loaded support on port[0] = 21 03:33:41 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x0, 0x140, 0xb4}) 03:33:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x0, 0x4, 'syz1\x00', 0x0, 0x0, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:42 executing program 4: 03:33:42 executing program 3: 03:33:42 executing program 0: 03:33:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x0, 0xb4}) 03:33:42 executing program 4: 03:33:42 executing program 3: 03:33:42 executing program 0: 03:33:42 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x0, 0xb4}) 03:33:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:42 executing program 4: [ 1383.935341][ T9050] IPVS: ftp: loaded support on port[0] = 21 03:33:43 executing program 0: 03:33:43 executing program 3: 03:33:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x0, 0xb4}) 03:33:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(0x0, &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:43 executing program 4: 03:33:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x0, 0x4, 'syz1\x00', 0x0, 0x0, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:43 executing program 0: 03:33:43 executing program 3: 03:33:43 executing program 4: 03:33:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(0x0, &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140}) 03:33:43 executing program 3: [ 1384.740327][ T9086] IPVS: ftp: loaded support on port[0] = 21 03:33:43 executing program 4: 03:33:43 executing program 0: 03:33:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140}) 03:33:43 executing program 3: 03:33:43 executing program 0: 03:33:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(0x0, &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:43 executing program 4: 03:33:43 executing program 3: 03:33:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x3, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00'], 0x30, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:43 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000800)={0xc, 0x32315659, 0x140}) 03:33:43 executing program 0: 03:33:43 executing program 4: 03:33:44 executing program 3: 03:33:44 executing program 0: 03:33:44 executing program 5: 03:33:44 executing program 3: 03:33:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', 0x0, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1385.589272][ T9125] IPVS: ftp: loaded support on port[0] = 21 03:33:44 executing program 0: 03:33:44 executing program 4: 03:33:44 executing program 5: 03:33:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x3, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00'], 0x30, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:44 executing program 0: 03:33:44 executing program 3: 03:33:44 executing program 4: 03:33:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', 0x0, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:44 executing program 5: 03:33:44 executing program 3: 03:33:44 executing program 5: sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) setgid(0x0) r0 = dup(0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x5d) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x435) write$apparmor_current(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000440)=""/75) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) io_destroy(0x0) add_key$user(0x0, &(0x7f0000000280)={'syz'}, &(0x7f0000000580)="dc2564781f972a503dd6ff8c996464c527c56a7d3ccb7db5f2c43b806d8166744e9c645b056e9b6e6cb11eb8bcc51b1561cc388c4831fdfd46f6f2c93e3ce307", 0x40, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) creat(&(0x7f0000000540)='./bus\x00', 0x2c) preadv(r0, 0x0, 0xffffffffffffffa8, 0x0) 03:33:44 executing program 0: syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x408280) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x39e, 0x0, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000100), 0x0) 03:33:44 executing program 4: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa002) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000180)={0x6e785e3d1cb434ee}, 0x14df) syncfs(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000240)="02", 0x1}], 0x1) [ 1386.268121][ T9156] IPVS: ftp: loaded support on port[0] = 21 [ 1386.496024][ T24] audit: type=1804 audit(2000000025.059:51): pid=9165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir978673188/syzkaller.qk5lKu/800/bus" dev="sda1" ino=16803 res=1 03:33:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, &(0x7f00000000c0)) r1 = getpgid(0xffffffffffffffff) getpgrp(r1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000003c0)={0x400000, 0x1f, 0x2, 0x21c4fd43, 0x3, [{0x5, 0x80000001, 0x7f, 0x0, 0x0, 0x400}, {0x0, 0x3, 0x200, 0x0, 0x0, 0x102}, {0x7, 0x7, 0x3, 0x0, 0x0, 0x100}]}) r2 = open(&(0x7f0000000380)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffc4b) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000000), 0xa) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:33:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', 0x0, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x3, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00'], 0x30, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) [ 1387.046408][ T24] audit: type=1804 audit(2000000025.319:52): pid=9214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir978673188/syzkaller.qk5lKu/800/bus" dev="sda1" ino=16803 res=1 [ 1387.070665][ T24] audit: type=1804 audit(2000000025.419:53): pid=9165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir978673188/syzkaller.qk5lKu/800/bus" dev="sda1" ino=16803 res=1 03:33:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', 0x0, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', 0x0, &(0x7f0000000a00)="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", 0x4c1, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="07010b008000000000ba10732b25bb5653ee50600a1551abdb2d906a2f381af0e9f2efb5348732b52231da942fb7cfbf1864861db294967c714bc34f0811ed79a23ed23363547bfb31a44b3dd8fa0f3169897eb004f2caed8fbdae7f8a44b4abc334146fd0d98a734e4221320f97a87e9dda3092f9fa0799a9af174ac017a482a343a4fa8e2329e47d1d9984b98d192f8c87aaceb03a27d7e8257d5948e88f9a40b9d100000000cfd89e2fe67e4f971e722b03e1440f00"/197], 0xc4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x30000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x1f, 0x4) timer_create(0x2, &(0x7f0000000300)={0x0, 0x2a, 0x7, @thr={&(0x7f00000000c0)="680c7f93f356154c89f299a3ef584ef2e4c4deb1db2bcb468eb429d86ca8aff5f47cb4458899baeb60af09f4ad660827350ceac04c0cdec3100429a342f4c9e772c3fe96ec1ad3af746144766ea401cd43fc546ab658e9c1f8db1ea6b792e540ed472041aabafc6f6accaff72c8563c9bd18cc", &(0x7f0000000280)="72aee583355761b57722c73eaf51e65df61d89a6b2d465d2ad9461442d75c6097825572f1bb12004ff983031d066a87abfce22964ffe4b36c1e2a966a940a17c6e6332a3f6e114"}}, &(0x7f0000000340)=0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000680)="6be8a8151f2da3eb643e7b0063fd77b29091d4784b3a7f2e25a1a69b71bce5c0728e7d26ae0acd7098d6b7cbbee139f7a412fd06fea5364a0fc608a92f4047b6375e32bb759bfe02d14d7ce476c8789afcf5d576967018905c2a322685c29cbe43d20c36dcc6c6a75f5a68d3aa68a4c6af07934a75b3eb2488c7cae4323e002b49512328af0c198b8fe52d9248e795b13f71829093596a3f185372c0c4936eee95f65835a9d84025eb80839298561dd3e3c385e072013bc6941a8a892c7976c6076cb539fdc5a921b3b656945080432b72157b5458fda1876bf35fda39c40493dbbbb0bae6bab87575d8", 0xea}, {&(0x7f0000000780)="30b05f1df8f93df7ae62fdc9dd12dd73016d7ded8f865507cb5d233dd542845247fa8499bcce050c3db6499e39a44eadf85fbce00657def17192ae4ad7c1aa9a0aec1791d837f8e67c2d63c09721", 0x4e}], 0x2, 0x0) timer_getoverrun(r2) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000800)={0x1, 0x70, 0x9, 0x6e2e, 0x2, 0x7, 0x0, 0x7ff, 0x4000, 0x0, 0x7fffffff, 0xfff, 0x2, 0x2, 0x6, 0x0, 0x5, 0x5, 0x7ff, 0x7ff, 0x200, 0x44c, 0x7, 0x2, 0x5000000000, 0x1f, 0x1, 0x8001, 0x1, 0x100, 0x4, 0xff, 0x101, 0x1, 0x5a6169c2, 0x2, 0x1, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x882c, 0x3f}, 0x0, 0x7, 0x0, 0xb, 0x4, 0xffffffffffff4baf, 0x2}, r5, 0xd, r3, 0x2) unshare(0x40000000) r6 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0xfffffffffffffff9, 0x440001) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000500)={{0x6, 0x0, 0x6c, 0x3, 'syz0\x00', 0xff}, 0x3, 0x40, 0x10001, r7, 0x3, 0x4, 'syz1\x00', &(0x7f00000004c0)=['@]lo@/]proc.vboxnet1.\x00', '#GPLsystem\x00', 'em0^!wlan0user\x00'], 0x30, [], [0xc942, 0x6, 0x1f, 0xfffffffffffffffd]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0xa0801, 0x0) 03:33:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1387.382275][ T24] audit: type=1804 audit(2000000025.669:54): pid=9214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir978673188/syzkaller.qk5lKu/800/bus" dev="sda1" ino=16803 res=1 03:33:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) 03:33:46 executing program 5: sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) setgid(0x0) r0 = dup(0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x5d) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x435) write$apparmor_current(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000440)=""/75) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) io_destroy(0x0) add_key$user(0x0, &(0x7f0000000280)={'syz'}, &(0x7f0000000580)="dc2564781f972a503dd6ff8c996464c527c56a7d3ccb7db5f2c43b806d8166744e9c645b056e9b6e6cb11eb8bcc51b1561cc388c4831fdfd46f6f2c93e3ce307", 0x40, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) creat(&(0x7f0000000540)='./bus\x00', 0x2c) preadv(r0, 0x0, 0xffffffffffffffa8, 0x0) [ 1387.632663][ T9503] IPVS: ftp: loaded support on port[0] = 21 [ 1387.644475][ T9501] IPVS: ftp: loaded support on port[0] = 21 03:33:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, 0x0, 0x0, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1387.731425][ T24] audit: type=1804 audit(2000000026.289:55): pid=9510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir978673188/syzkaller.qk5lKu/801/bus" dev="sda1" ino=16817 res=1 03:33:46 executing program 3: sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) setgid(0x0) r0 = dup(0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x5d) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x435) write$apparmor_current(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000440)=""/75) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) io_destroy(0x0) add_key$user(0x0, &(0x7f0000000280)={'syz'}, &(0x7f0000000580)="dc2564781f972a503dd6ff8c996464c527c56a7d3ccb7db5f2c43b806d8166744e9c645b056e9b6e6cb11eb8bcc51b1561cc388c4831fdfd46f6f2c93e3ce307", 0x40, 0xfffffffffffffffa) keyctl$revoke(0x3, 0x0) creat(&(0x7f0000000540)='./bus\x00', 0x2c) preadv(r0, 0x0, 0xffffffffffffffa8, 0x0) 03:33:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00), 0x0, r2) keyctl$read(0x3, r3, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffffffffff00, "451af37066d8fdb82b3eea98b3257a75ab54d4be82699ecb9f2e05d2403400f8", 0x2, 0x1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000004c80)='TIPCv2\x00') r5 = syz_open_dev$adsp(0x0, 0x0, 0x2) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/57, 0x39}, &(0x7f0000000080), 0x15}, 0x20) [ 1388.439839][ T24] audit: type=1804 audit(2000000026.599:56): pid=9603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir978673188/syzkaller.qk5lKu/801/bus" dev="sda1" ino=16817 res=1 [ 1493.536284][ C1] rcu: INFO: rcu_sched detected stalls on CPUs/tasks: [ 1493.543110][ C1] (detected by 1, t=10502 jiffies, g=144053, q=54) [ 1493.549697][ C1] rcu: All QSes seen, last rcu_sched kthread activity 10492 (4295086505-4295076013), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 1493.562875][ C1] syz-executor.5 R running task 26184 9510 9601 0x00004000 [ 1493.570774][ C1] Call Trace: [ 1493.574054][ C1] [ 1493.576917][ C1] sched_show_task.cold+0x2ef/0x350 [ 1493.582120][ C1] rcu_sched_clock_irq.cold+0x837/0x8c0 [ 1493.587676][ C1] update_process_times+0x32/0x80 [ 1493.592707][ C1] tick_sched_handle+0xa2/0x190 [ 1493.597561][ C1] tick_sched_timer+0x47/0x130 [ 1493.602333][ C1] __hrtimer_run_queues+0x364/0xd90 [ 1493.607538][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 1493.612919][ C1] ? hrtimer_start_range_ns+0xbc0/0xbc0 [ 1493.618462][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1493.624178][ C1] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 1493.630257][ C1] hrtimer_interrupt+0x2ea/0x730 [ 1493.635213][ C1] smp_apic_timer_interrupt+0x10b/0x550 [ 1493.640762][ C1] apic_timer_interrupt+0xf/0x20 [ 1493.645692][ C1] [ 1493.648635][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x1/0x50 [ 1493.654699][ C1] Code: 25 24 5b 19 09 41 bc f4 ff ff ff e8 2d 35 ea ff 48 c7 05 0e 5b 19 09 00 00 00 00 e9 77 e9 ff ff 90 90 90 90 90 90 90 90 90 55 <48> 89 e5 65 48 8b 04 25 c0 fd 01 00 65 8b 15 f4 a6 90 7e 81 e2 00 [ 1493.674304][ C1] RSP: 0018:ffff8880577c77d0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 1493.682721][ C1] RAX: 0000000000000002 RBX: ffff888022cff330 RCX: ffffffff81bb859c [ 1493.690694][ C1] RDX: 0000000000000020 RSI: 0000000000000000 RDI: 0000000000000005 [ 1493.698660][ C1] RBP: ffff8880577c7808 R08: ffff8880a8b46480 R09: fffffbfff14a6d51 [ 1493.706629][ C1] R10: fffffbfff14a6d50 R11: ffffffff8a536a87 R12: 0000000000000020 [ 1493.714598][ C1] R13: 0000000077359484 R14: 0000000005f5dd04 R15: ffff8880964256b0 [ 1493.722583][ C1] ? atime_needs_update+0x2dc/0x5f0 [ 1493.727884][ C1] ? atime_needs_update+0x2ea/0x5f0 [ 1493.733104][ C1] touch_atime+0xce/0x2a0 [ 1493.737441][ C1] ? atime_needs_update+0x5f0/0x5f0 [ 1493.742643][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.748898][ C1] ? pagecache_get_page+0x1b5/0x880 [ 1493.754108][ C1] generic_file_read_iter+0x182c/0x1de0 [ 1493.759670][ C1] ext4_file_read_iter+0x1d6/0x420 [ 1493.764788][ C1] generic_file_splice_read+0x4af/0x800 [ 1493.770332][ C1] ? add_to_pipe+0x350/0x350 [ 1493.774940][ C1] ? rw_verify_area+0x126/0x360 [ 1493.779790][ C1] ? add_to_pipe+0x350/0x350 [ 1493.784380][ C1] do_splice_to+0x127/0x180 [ 1493.788887][ C1] splice_direct_to_actor+0x2d2/0x970 [ 1493.794262][ C1] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1493.799808][ C1] ? do_splice_to+0x180/0x180 [ 1493.804488][ C1] ? rw_verify_area+0x126/0x360 [ 1493.809342][ C1] do_splice_direct+0x1da/0x2a0 [ 1493.814197][ C1] ? splice_direct_to_actor+0x970/0x970 [ 1493.819750][ C1] ? rcu_read_lock_sched_held+0x110/0x130 [ 1493.825469][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1493.831706][ C1] ? __sb_start_write+0x1b2/0x460 [ 1493.836730][ C1] do_sendfile+0x597/0xd00 [ 1493.841159][ C1] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1493.846446][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1493.852751][ C1] ? put_timespec64+0xda/0x140 [ 1493.857529][ C1] __x64_sys_sendfile64+0x1dd/0x220 [ 1493.862726][ C1] ? __ia32_sys_sendfile+0x230/0x230 [ 1493.868011][ C1] ? do_syscall_64+0x26/0x6a0 [ 1493.872688][ C1] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1493.877973][ C1] ? trace_hardirqs_on+0x67/0x220 [ 1493.883001][ C1] do_syscall_64+0xfd/0x6a0 [ 1493.887527][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1493.893421][ C1] RIP: 0033:0x459819 [ 1493.897316][ C1] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.916918][ C1] RSP: 002b:00007f9d3aa19c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1493.925329][ C1] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459819 [ 1493.933303][ C1] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 1493.941271][ C1] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1493.949240][ C1] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f9d3aa1a6d4 [ 1493.957211][ C1] R13: 00000000004c6e87 R14: 00000000004dc238 R15: 00000000ffffffff [ 1493.965207][ C1] rcu: rcu_sched kthread starved for 10492 jiffies! g144053 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 1493.976301][ C1] rcu: RCU grace-period kthread stack dump: [ 1493.982192][ C1] rcu_sched R running task 29048 10 2 0x80004000 [ 1493.990089][ C1] Call Trace: [ 1493.993385][ C1] __schedule+0x772/0x1530 [ 1493.997822][ C1] ? __sched_text_start+0x8/0x8 [ 1494.002684][ C1] ? _raw_spin_unlock_irqrestore+0x67/0xd0 [ 1494.008490][ C1] ? schedule_timeout+0x444/0xbc0 [ 1494.013517][ C1] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1494.018808][ C1] schedule+0xa5/0x260 [ 1494.022881][ C1] schedule_timeout+0x44e/0xbc0 [ 1494.027731][ C1] ? _raw_spin_unlock_irqrestore+0x67/0xd0 [ 1494.033542][ C1] ? usleep_range+0x170/0x170 [ 1494.038220][ C1] ? trace_hardirqs_on+0x67/0x220 [ 1494.043241][ C1] ? __kasan_check_read+0x11/0x20 [ 1494.048268][ C1] ? __next_timer_interrupt+0x1a0/0x1a0 [ 1494.053816][ C1] ? swake_up_one+0x60/0x60 [ 1494.058327][ C1] rcu_gp_kthread+0x835/0x1320 [ 1494.063096][ C1] ? rcu_barrier+0x310/0x310 [ 1494.067684][ C1] ? trace_hardirqs_on+0x67/0x220 [ 1494.072705][ C1] ? __kasan_check_read+0x11/0x20 [ 1494.077735][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1494.083980][ C1] ? __kthread_parkme+0x108/0x1c0 [ 1494.089000][ C1] ? __kasan_check_read+0x11/0x20 [ 1494.094024][ C1] kthread+0x361/0x430 [ 1494.098090][ C1] ? rcu_barrier+0x310/0x310 [ 1494.102687][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1494.108931][ C1] ret_from_fork+0x24/0x30