7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x10002) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4000, 0x0) bind$inet6(r2, &(0x7f0000000280)={0xa, 0x4e23, 0x4, @mcast1, 0x74b}, 0x1c) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f00000002c0)=0x4a3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffff) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000300)=""/133) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @rand_addr=0xe8}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r4, 0x2, 0x7}, &(0x7f0000000240)=0x8) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000180)=0xfffffffffffffe00, 0x4) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, 0x0, &(0x7f0000000000)) 13:49:33 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60a2fbe800383a0000000000000000000000ffffe0000002ff0200000000000000000000000000010300907800000000609433df00003200ff02000000000000000000000000000100f30000000000000000000000000001fca967e17f791010"], 0x0) 13:49:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:33 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000500400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:33 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 1242.989112][T21120] IPVS: ftp: loaded support on port[0] = 21 13:49:33 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702ff5ffe5f0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000000c0)={{0xa, 0x2, 0x0, 0xfff, 'syz1\x00', 0x3}, 0x1, [0x400, 0x6, 0x1, 0x100, 0x0, 0x7, 0x0, 0x4, 0xfffffffffffffffd, 0x7, 0x6, 0x4, 0xe498, 0xfffffffffffffffe, 0x3ff, 0x1f, 0x1, 0x0, 0x7fff, 0x6, 0x2, 0x7fffffff, 0x4, 0x2, 0xff, 0x2, 0x1ff, 0xffffffff00000001, 0x3, 0xf9d3, 0x3d1, 0x7be, 0xfff, 0xf1, 0x4, 0xc33c, 0x3, 0x6, 0x5, 0x9, 0x9, 0x3, 0x1, 0x8, 0x1000, 0x8e, 0x4, 0x8, 0x3, 0x8, 0x1000, 0xd62, 0x800, 0x7, 0xff1, 0xfffffffffffffffa, 0x200, 0x20, 0x1, 0x1000, 0x7, 0x9, 0x1, 0xab18, 0x8001, 0x2, 0x8000, 0x4, 0x8, 0xffffffff, 0x1958, 0x4, 0x8, 0x3a4, 0xb3, 0x9, 0xac0, 0x0, 0x0, 0x0, 0x7f, 0xffffffffffffffff, 0x8, 0x8000, 0xfff, 0xff, 0x5, 0x100, 0xfffffffffffffff7, 0x1, 0x100, 0x2, 0x8001, 0x400, 0x8, 0x0, 0x7, 0x81, 0x3, 0xffffffffffffff4b, 0x8, 0x72b, 0x0, 0x7, 0x1f, 0x2, 0x7, 0x9, 0x3, 0x9837, 0x7, 0x80000001, 0x4a, 0x8, 0x6, 0x3ff, 0x4, 0x9, 0x5, 0x8, 0x7, 0x8, 0x3, 0x9, 0x2f61, 0x1, 0x9, 0x200], {0x77359400}}) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) 13:49:33 executing program 1: r0 = socket(0x9, 0x5, 0x20000000000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e24, 0xf2f, @empty, 0x7}, {0xa, 0x4e24, 0x1, @rand_addr="a0e92a15fee4ad26dca1eca3f7e42735", 0x6c}, 0x3, [0xffff, 0x5, 0x1, 0x100000000, 0x0, 0x445, 0x7f, 0x2]}, 0x5c) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x7, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x8000, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x800}, 0x8) ioctl$VIDIOC_G_PARM(r1, 0xc0485619, &(0x7f0000000040)={0x0, @raw_data="928498c00c743b140faff9308e99fdefa10289859684eaa21891a1dc489224d281feb32d39d5ab9fb77ebc2352514f6acf66494cd723475d0c0f0ce96689fce9383f89a258dd2715f3e33378dc39fb5a9354a03315a4395fcbeddf47a6eb18885f32205fd3af06ffea904e898a93358defe06bdbfdf5cec4ce4e4bda96b5986939e65e25a741e4e8a36ca9839630d37809c209f051f60cee6cb5a0d1bdf5ae8287b33c53c22d3508ea3c2757e6a3a560cef1289575cb8a6937da0af27f8a500235c2e23eceec4363"}) 13:49:33 executing program 5: syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5414, &(0x7f0000000080)) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x400, 0x0) [ 1243.237773][T21149] IPVS: ftp: loaded support on port[0] = 21 13:49:33 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000600400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1243.577340][T21171] IPVS: ftp: loaded support on port[0] = 21 13:49:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000000280)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2100) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x75a) 13:49:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448cb, 0x0) 13:49:34 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000006f0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000025c0)=0x7ff, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x200000000004e23, @multicast2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4a, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f00000000c0), 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x5000000, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xdc0000}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 13:49:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:35 executing program 1: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffff}) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {}, [], {}, [{}, {}, {}, {}, {}, {}, {}]}, 0x5c, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_SECRET={0x10, 0x4, [0xfffffffffffff42c, 0x400, 0x4]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 13:49:35 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000700400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6c, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x16, 0x0, 0x0) ioctl(r3, 0x81000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x102, &(0x7f0000000140)={@local, @local, [{[{0x9100, 0x6, 0x20, 0x1}], {0x8100, 0x5, 0x2, 0x4}}], {@generic={0x9200, "8867e4dee863c2e74896158a0845fdc0e0f9f58485d88b3d87587b47a049d68425d8e2e95d67e120e10d54da1b874b0dfd71b1babe690fab16d95a5303a272a6f7c22e00e4a9d3f5b86477a937af0fc4cc969df68fe8978ae2d11f0017084450dbabbeb98d9612833b30da944ac5c82e6448a528bca1b5bbdad84b328a739c7823ee2683ce826cd108da7fe8539d17e38dc291ba01d4bc0da4e45eaa509ec09529e3da6e5c5939ad7fc576a5b1f0508ce2083d78c7cb5ffcf3c1019b2bfa1a991054662b8b27182f277b5d67a2b9e4fcb2db3d19996fbe988c71564f5a29067b59bf9b6e483ffb1837400d47"}}}, &(0x7f0000000000)={0x0, 0x4, [0x4fc, 0xd6a, 0x172, 0x90d]}) r4 = dup2(r0, r2) dup3(r4, r1, 0x0) 13:49:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:35 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702ffffff800400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:35 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000810400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1245.049684][T21186] IPVS: ftp: loaded support on port[0] = 21 [ 1245.576676][T21214] IPVS: ftp: loaded support on port[0] = 21 13:49:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x103000) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000280)={0x2a9, 0x0, 0x0, 0x9, 0x11, 0x7f, 0x101, 0x6, 0xfff, 0x7fffffff, 0x4}) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xfff}], 0x18}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 13:49:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:36 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702ffffff900400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="10dca50d5e0bcfe47bf070") getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0xc, "04d732bc1a3333c13bfbd7ec"}, &(0x7f00000000c0)=0x30) socket$inet(0x2, 0x3, 0x2) r1 = dup(r0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000240)) setsockopt$inet_int(r1, 0x1f00000000000000, 0xcf, &(0x7f00000001c0)=0x100, 0x4ba) 13:49:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setrlimit(0x4000000007, &(0x7f0000a9cff8)={0x0, 0x7}) dup(r0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:49:36 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x41400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r1, 0x10, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x1c800000, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'bpq0\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00`\x00'}, 0x18) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "00b9be4a7a"}, 0x6, 0x0) 13:49:36 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702008000a00400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x5, 0x800, 0x3}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r0, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) 13:49:36 executing program 4: ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000680)={0x0}) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f0000000240)={"97a6cdbc1e528cf917837463d26fca3d09da501081525bf173bc340e48582820efc50546fe6f087a1628ec3ec7cce7d7c299c7bdb1a59554a7faca57df086d1d517c9f6bc6d17fd7d7d8d21dd040997103cbf7e174507101a17066b67c3cf308999d8794a6f94498d375e4051768830196ac6ab63e0c4c8b5e6b647dc5aa0245e07ac5b43f9380cd5ce969e4c675101b17668d33c2f6297fc47d873a7c21c4a977c5f2045839c74ff9c2a0724610efbe7846b285591071fb0560986eab51a85904060536cf0d6312c49787ea3b7139e4b17929e532b39213175c9e2c94ab122e7065a79ea5b08b0b4bb7f830e720ae738d7b6e215a0720b5e1b6ecbf2ec1244265afc33cdb0c723185cf6d8c5aa76445f59fe34584e9b189ecd884108fcc8a644e5e417c9ca86b8a19ee199bb0023d25d2cb031fdf6e2da007887f3c99f1d2633181343506f0a1ae8be707122139a92e780a300990b833a8e5904559c25759d9c11be1828536124c8065dcc7e545af4d28118a2626623073b602c38a9b98987d8c874c72e3e569e292d4daac38023a9cff1009ca8fe6188caea57057ea06a72bf25de04ed416a7b652faa5b49a9933fa4c2d83888609c4a61e74d1c3f987c6a132a9ffe645a7e884e43a86f99a6c0c4a3ccfe831d57c873f28ce4275af498b2ec02a7db6ff06613641fed51e7e982a15f274d93692fff1e93414c75910e1cc5e881c4496fbcc2aaf2d504a352237ea7f89e3f13a8c6a95dadfdbc018fd10f495c9b216f623dc2636dce6e3bc85451901e569346f9bd6eb480362839d334002f5023924368287abff2f1c66a1a1452c9d4cff00e86f8bf6aaa4728fbe26da4c40d546c74e5b1db24b2b59f417c98d9462b3122c63d5e0288608b47325200e669f132d5888962edc469ba3418a5683705b165345fd17783910dc5d2cb9b4a61f8b199f7ccf9c0ebdf06580c340988477abf7ea3f549f46184927b9b122f08da1cd97d3c22a81caa2971c037ae92c7c895d4e9c5f3df2923246f049b84ba49cb2ecc5028327c4564ae32892b208eabf65a2954e5e40ac288526b3c938523f4341a1dbe57832705a4febabd4860e69ff9f44a43ba19ea76cc72f10c5bef687cb91ee858e1ac047f07c597266c5fc8937f5a60ff29749aab6f03d937b127867977489678c07da1f27e23600fb936abde1b39070705a7f3da33c8db51bdb9563c687914d0f3bdcf4e2bd7b7912feea668a2042e0b98c4b380da79e24b06a83e453f1e3c1f58ec80c406b4174225024285d33396b164c38f7c3cfe4cf1bdfda7b28e6a1dc4b894ceeb826c5f8e46f4df35dd5989649a80c88d0b6a280aad98597f25e38c6d86cc48bb19298ae04809767a0dac9de22f9e88cb23d5899df8e1582c5f915e49b0f43235c74c41acbf6f04ede39b2fdcfcd120edce2f88998e99d0f92eb57"}) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f00000006c0)={0x9, 0x101, "8ff1ac6a96bf59639316cebe6dc0ef3dce2fa427b4db74461466b5d18ca9974f", 0x6, 0x7fff, 0xffff, 0x401, 0x1}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000200)={r0, 0x8, &(0x7f0000000100)=[0x1, 0xf8, 0x9, 0x80, 0x1, 0x1, 0xfffffffffffff0d3, 0xf3], &(0x7f0000000140)=[0x2, 0x42], 0x4, 0x1, 0x7fff, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x9, 0x5, 0x0, 0xac0b, 0x5, 0x41d46a85, 0xe, 0x6]}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@shortname_winnt='shortname=winnt'}]}) 13:49:36 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000001a00400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1245.961967][T21244] FAT-fs (loop4): bogus number of reserved sectors 13:49:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\xf3\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xd0', 0x0, 0x0) socketpair(0x8, 0x800, 0x8001, &(0x7f0000000100)={0xffffffffffffffff}) chdir(&(0x7f00000003c0)='./file0\x00') ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x80000, r1}) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=@known='com.apple.FinderInfo\x00') r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x12040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000c00)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe8) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000d40)=r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000b40)='./file0\x00', 0x101000, 0xed52856f2a67d0b5) write$binfmt_script(r0, &(0x7f0000000540)={'#! ', './file1', [{0x20, '$eth1self\\-^'}, {0x20, 'ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf'}], 0xa, "86ee5ceefddeade4249f7276ddac"}, 0xfe) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000700)="67f3efcd86e805fa64fddb9a588b307e208b1768aa4bad3753d5d2781e8d75ce361ac87e26c1d734108e7a4fe9c9fbd911ccc9540c22d4f67f728dee1ac397ee4345eb5a6f2eb4c3b1a3673f2f7d3e01852c74a96b564c3407b8a74dd90582c062e02a0cf8a4", 0x66}, {&(0x7f0000000780)="e4500b0b2e35ab9d10ff", 0xa}, {&(0x7f0000000a00)="e6d201c550ffde8b8505b56b9402dfcf900b8a259587b2ecb424e0667fa309c1df8642e6053ba0e8af338782a01e3a46cb52ae950fe222cc5072cf9c00d0cfc558875f55d27bb4fefb90384c4c2a2f23cd10a6638bfe8692e53582c8f0f0d3d11ac65a88b7d3bce759c67e7ffdebcbfc07dbb594491cfcb4e58b1b84db03b852ef08b5be415d1af327ff81bb4a444b312f443e8f3d4c1546c013f02a2f83fe926d291c60286dbe32e2a855965d7f3f3831a2d30e9d3f2a35ecf257167fb64475a1a2ac931c8ffe7127e22a9df45e2f014086e6c04fe528b181827da1fb", 0xdd}, {&(0x7f00000007c0)="bf5ee06a371f6b9046ee0ae75abf5167919c27baeca062376fed1ccc974b5af73e26a94aafc9c387ad1f37ef717646607a9f94", 0x33}], 0x4, 0xa) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000800)=ANY=[@ANYRES16=r2, @ANYRES64=r1, @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYPTR64, @ANYPTR64, @ANYBLOB="c1a0127516ed94b236942e60bc1d1a9b542f2ca069c1e0af292e2100dd452fc915b37764fb5c63f4318257e021cb32f87ed179e819ffac4b1bab2f441160c05f2d26b9586ad4fa6006a0846c48e4a4843df5b0370bf38eb81778cf6683dc33b87bba12678f31db4ff212473fd5492a7d1fd2ae5c081cfd4e272d46", @ANYPTR64], @ANYRES32=r2, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYRESDEC=r1]], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES16=r3, @ANYRES32=r1, @ANYRES32=r0]]) umount2(&(0x7f0000000040)='../file0\x00', 0x2) write$FUSE_GETXATTR(r6, &(0x7f0000000380)={0x18, 0x0, 0x3, {0x7ff}}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r6, 0xc008ae67, &(0x7f0000000280)={0xfae9, 0x80}) link(&(0x7f00000002c0)='./file0/file0/../file0\x00', &(0x7f0000000340)='./file1\x00') [ 1246.003972][T21244] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1246.111386][T21254] FAT-fs (loop4): bogus number of reserved sectors [ 1246.127608][T21254] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1246.164807][T21233] IPVS: ftp: loaded support on port[0] = 21 13:49:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='cmdline\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000300)={0x3, 0x1, 0x2, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2000) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r1, &(0x7f0000000280)={0x40000000}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r5, r6) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:37 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702ffffffa00400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x4c, r2, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x602d}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000004}, 0x2dde3fdd92e0f950) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)) epoll_create(0xe) socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ad56bec50402bb5c61bc8d3869cd00c2", 0x10) sendmmsg$unix(r3, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x6c, &(0x7f0000000e40)}], 0x8d9, 0x7ffff000) 13:49:37 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000240)='reiserfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030ff3030303030303030300700"]) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20c00, 0x0) fsetxattr$security_ima(r0, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@md5={0x1, "6ae598f2201069299926bb5c6d502146"}, 0x11, 0x1) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000340)=0x5) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000580)={0x5, 0x1, 0x2, 0x1000, 0x5}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000900)='TIPCv2\x00') getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000010) r2 = request_key(&(0x7f00000005c0)='.request_key_auth\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0xffffffffffffffff) keyctl$set_timeout(0xf, r2, 0xb1) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000680)) r3 = open(&(0x7f0000000380)='./file0\x00', 0x1, 0x94) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000006c0)={0x9, 0x8, 0x1, 0x0, 0x7, [{0x8, 0x80000001, 0x200, 0x0, 0x0, 0xf09}, {0x4, 0x0, 0x0, 0x0, 0x0, 0x4}, {0xfffffffffffff879, 0x40, 0xd195, 0x0, 0x0, 0x3080}, {0x0, 0xd0, 0xff, 0x0, 0x0, 0x500}, {0x40000, 0xfff, 0xd01c}, {0x7, 0x6, 0x4, 0x0, 0x0, 0x2}, {0x3, 0x80000011, 0x5, 0x0, 0x0, 0x100}]}) 13:49:37 executing program 1: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x100000000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x89fce8ff81923eb5, 0x0) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000040)='^\x00', 0x2) ppoll(&(0x7f00000000c0)=[{r0, 0x26}], 0x1, 0x0, 0x0, 0x0) [ 1246.707505][T21250] IPVS: ftp: loaded support on port[0] = 21 [ 1246.828707][T21272] REISERFS warning (device loop4): super-6508 reiserfs_parse_options: bad value 0x000000ÿ000000000 for -ocommit [ 1246.828707][T21272] 13:49:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x440180, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e0000002ac1414aa0100000001000000ac1414aa"], 0x14) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) 13:49:37 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702ffffffb00400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1246.959921][T21289] IPVS: ftp: loaded support on port[0] = 21 13:49:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="3900000013000904aa570700000000000700ff3f04000000450a01070000001419001a00050096b4ca7a0000080000004008000800005d14df", 0x39}], 0x1) r1 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x9, 0x40) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000080)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) socket$netlink(0x10, 0x3, 0xa) [ 1247.030040][T21272] REISERFS warning (device loop4): super-6508 reiserfs_parse_options: bad value 0x000000ÿ000000000 for -ocommit [ 1247.030040][T21272] 13:49:37 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702fffff5bf0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:37 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x40000, 0x0) io_setup(0xc, &(0x7f0000000200)=0x0) io_submit(r1, 0x1, &(0x7f0000000500)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 1247.399752][T21292] IPVS: ftp: loaded support on port[0] = 21 13:49:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x20000, 0x0) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f0000000340)) r4 = dup3(r0, r2, 0x80000) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000280), &(0x7f0000000080)=0x60) 13:49:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth1\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @initdev}, 0xfffffffffffffd7f) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x14) close(r0) io_setup(0xffff, &(0x7f0000000240)=0x0) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x7f, 0x800) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x3, r1, &(0x7f0000000100)="e8680ce3df907dc89aa6d3bb862390655348d8409829906734a585fe26edaa9463987952bedbae08a5546879ae225af3c5670e786bda986d8bb7af538ca4ffb29731b81808336d6440337776131ad03056555e46ff56c1a44cdb5b0c6b045b", 0x5f, 0x0, 0x0, 0x2, r3}, &(0x7f0000000200)) 13:49:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[], 0xffe6) 13:49:37 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702ffffffc00400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:37 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x20020000) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r2 = dup(0xffffffffffffffff) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x8, 0x8, 0x1}) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18}, 0x18) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000001c0)=""/181, 0xb5) write$FUSE_DIRENTPLUS(r2, &(0x7f00000008c0)=ANY=[@ANYBLOB="b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/124, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x009P2000.u'], 0xb0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7472616e8f3d66642c0000646e6f31ac7bf33990ff00143b90f2a5dc2bb7192e86655930b247", @ANYRESHEX, @ANYBLOB="6f3d0000b30ca1af61277ea3649983127e666805c97fd07002fab1399f1dd38acd0b6fef738bb9c3340729d268c54108dea6803921", @ANYRESHEX]) poll(0x0, 0x0, 0x400007f) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r2) rmdir(&(0x7f0000000300)='./file0\x00') 13:49:38 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702ffffffd00400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000bc0)=""/138, 0x8a}], 0x1, &(0x7f0000000c80)=""/128, 0x80}, 0x2040) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000dc0)={'bridge_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000f00)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000001140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001100)={&(0x7f0000000f40)=@polexpire={0x1ac, 0x1b, 0x400, 0x70bd28, 0x25dfdbfb, {{{@in=@local, @in=@remote, 0x4e23, 0x8, 0x4e20, 0x6, 0x2, 0xa0, 0x80, 0x0, r2, r3}, {0xa1, 0x3, 0x4d36, 0xe2, 0x1cc, 0x0, 0x100000001, 0x213b6b28}, {0xc2, 0x6, 0x3, 0x200}, 0x4, 0x6e6bb8, 0xc65a32830b1e4999, 0x0, 0x0, 0x1}, 0x9}, [@policy={0xac, 0x7, {{@in6=@mcast2, @in6=@mcast2, 0x4e23, 0x5, 0x4e21, 0x2d5dfccf, 0x2, 0x80, 0x80, 0x29, r4, r5}, {0x401, 0x8, 0x1, 0xff, 0xffffffffffff96f7, 0x3, 0x2, 0x6}, {0x4, 0xfffe0000000000, 0x10000000, 0x7}, 0x8, 0x6e6bb1, 0x3, 0x1, 0x2, 0x1}}, @srcaddr={0x14, 0xd, @in=@loopback}, @lifetime_val={0x24, 0x9, {0x100000000, 0x4, 0xfffffffffffffffd, 0xb83}}, @output_mark={0x8, 0x1d, 0x80000001}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4081}, 0x40000) r6 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000006000000000000000000000000000000000000000000000000000000000010000000000000000600000000000000000000000000000000000000200000000000ab7cc871e016177500"/94], 0x4}}, 0x0) r8 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff8, 0x8080) ioctl$VIDIOC_G_ENC_INDEX(r8, 0x8818564c, &(0x7f0000000380)) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x49, &(0x7f00000000c0), 0x4) 13:49:38 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000ff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:38 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000000)) fcntl$getflags(r0, 0x0) read$rfkill(r0, &(0x7f0000000100), 0x8) 13:49:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:38 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) [ 1247.831794][T21342] IPVS: ftp: loaded support on port[0] = 21 [ 1248.119465][T21347] IPVS: ftp: loaded support on port[0] = 21 13:49:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1000000000000, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) sendmmsg$unix(r0, &(0x7f0000000ec0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="000000000000000001000000b81e0000"], 0x10}], 0x1, 0x0) 13:49:38 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000001ff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:38 executing program 5: r0 = socket(0x10, 0x80000000000802, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) write(r0, &(0x7f0000001d00)="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", 0xfc) 13:49:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1248.276696][T21369] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1248.340564][T21377] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1248.376823][T21378] IPVS: ftp: loaded support on port[0] = 21 13:49:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/46, 0x2e}, {&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f0000000080)=""/43, 0x2b}], 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x3, 0x80000) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xa2) syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="0180c2000000ffffffffffff08004500003c0000000000299078ac23149846d77cf3bbac1414000304907800e049336addff0000000000ac2314aaac141400000c0000000000000000000025c7c80812a6f06d13a1434a838529c2c18c4464fdd7a18e3c3ca173f4103a5d501bca5dbc889c9033afd4d8e3d2b3980bbaa18c5ce05f7380d8a13eba6008348bc4de17f1131833fd02eaabb1a8c4e24690af59a4c0f30474324c89e16a44c7d1f3009b33ff5023770f96ab45610263a580a904fae165b9ec3462c925e9522b714edac06bdb4ff8aa0557e25e29f14a82e86bfb30f2c10fedf821ab4008e5a0a6dd90cf91e5565670b039a676e1a371ce52739a780098492e54e54e3454b947fdd6d09bc2693f276ff3cc30d762871188cab1e70a7a20a4993ca764155b749696a46be383066b22503b4f60184711dcd9cea28767c82b78adee1726000000136dff4a4dc36e60dc230ab0b2afc593934369b8f5eefc"], 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x6, &(0x7f0000000140), &(0x7f0000000240)=0x4) 13:49:38 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7025ffe5fff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:38 executing program 4: r0 = geteuid() r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x1) r2 = accept4$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @dev}, &(0x7f0000000600)=0x10, 0x800) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpu.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000680)={r2, r3}) ioprio_set$uid(0x3, r0, 0x7) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x4a8, 0x280, 0x140, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@arp={@dev={0xac, 0x14, 0x14, 0x23}, @broadcast, 0xff, 0x0, @empty, {[0x0, 0xff, 0xff, 0xff]}, @mac=@random="9120844b287c", {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}, 0x1, 0x60c5, 0x3, 0xfa, 0x3f, 0x5, 'bridge0\x00', 'team_slave_0\x00', {}, {0xff}, 0x0, 0x120}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@random="94b7c5e2cf20", @dev={0xac, 0x14, 0x14, 0x1a}, @broadcast, 0xb0e5c182551b3baf, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @multicast1, 0xf, 0x1}}}, {{@arp={@empty, @rand_addr=0x8, 0x0, 0xff000000, @mac=@remote, {[0xff, 0x0, 0xff, 0xff, 0xff]}, @mac=@local, {[0xaf18c81840bb0290, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0xa, 0x3, 0xfff, 0x4, 0x82, 0x8, 'irlan0\x00', 'nlmon0\x00', {0xff}, {0xff}, 0x0, 0x12}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @multicast2, @loopback, 0xf}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f0000000080), 0x4) 13:49:38 executing program 5: r0 = socket$kcm(0x10, 0x22, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xc9, &(0x7f0000000200)=[{&(0x7f0000000040)="2e0000001e000507ed0080647e6394f26731d2000500120111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) setpriority(0x5, r1, 0x2) 13:49:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1248.483240][T21384] IPVS: ftp: loaded support on port[0] = 21 13:49:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000140)={0x2, 0x24, [0x7, 0xfffffffffffff800, 0x6, 0x1, 0x1c6, 0x0, 0x4, 0x4, 0xfffffffffffffff8]}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x600, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000100)={0x3, "a2d65d"}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xb6594eccf59881e4, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000002f00ff03000000000000fb060000090d00000800", @ANYRES32=0x0], 0x1c}}, 0x0) 13:49:39 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x2) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b04, &(0x7f0000001fc0)='wlan1\x00\a\xd3~\xd4\xa2\xb8\x01\x80\x00\x00\xff\xff\xff\x8d\x02\x00\x00\x00\x00\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x9d\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fkb\x91z\x8eKi)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[\x8c\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2/\xa9\\%\xc8\xfa\xd9t\xa7\x1biU\xa9_\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03\x1b-^(\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99[\x9c\xaa\x02W\x92\x1a\xacZIz\xd4Op\x8b\x8cl\x81}\x12\x94\xcb\xad\xdb\xe4\x1a\xe8_\rOw\xa0\xc6&e\xde4v\xfaN\x15yK\t1\x1e\xe7\xb8}\x01\xb3\xb2') 13:49:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0xfffffffffffffffe) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r3 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0xc552, 0x400) write$FUSE_STATFS(r3, &(0x7f0000000300)={0x60, 0x0, 0x2, {{0x7, 0x3, 0x9, 0xa669, 0x4d2, 0x1f, 0x80000000000, 0x3}}}, 0x60) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000080), &(0x7f0000000280)=0x4) socket$can_raw(0x1d, 0x3, 0x1) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:40 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200009fff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:40 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x9, 0x8040) r1 = open(&(0x7f0000000380)='./file0\x00', 0x800, 0x10) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000300)='debug', &(0x7f0000000340)='./file0\x00', r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chroot(&(0x7f0000000280)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x104010, &(0x7f0000000240)={'trans=unix,', {[{@access_client='access=client'}, {@debug={'debug', 0x3d, 0x6}}, {@access_user='access=user'}]}}) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='../file0\x00', 0x2) 13:49:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:40 executing program 5: r0 = memfd_create(&(0x7f0000000140)='GPL\x00', 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0x80000000, 0x8, 0x6, 0x4}) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f4507000000acdb16298f9dfbf6734fef"], 0x11) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:49:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000140)=0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20408030) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = dup(r0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000880)=@security={'security\x00', 0xe, 0x4, 0x550, 0x2c8, 0x198, 0x2c8, 0x198, 0x2c8, 0x480, 0x480, 0x480, 0x480, 0x480, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0x158, 0x198, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x29, 0x7828, 0x2, 0x2, 0x3, @ipv4={[], [], @local}, @empty, @remote, [0xff000000, 0xff000000, 0xffffffff, 0xffffff00], [0xffffff00, 0xff, 0xff000000, 0xff000000], [0x0, 0xff, 0x4d0bb1d168109ea4], 0x10, 0x3024}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x80000000, 0x4, "c6b5dc137889646dd144fbde9828fae344610c2a4a5866eaa4836e485e3e"}}}, {{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xb, 0xfffffffffffffff8, 0x2, 0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x80, 0x2, "a1bfd941d6b1c6e1bd46b28fb1acbf91157802de8715034ff306b9a6f09a"}}}, {{@uncond, 0x0, 0x188, 0x1b8, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x0, 0x40000000000000, 0x108, 0xfff, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, @mcast2, [0x0, 0x0, 0x0, 0xffffffff], [0xffffffff, 0xff, 0xff000000, 0xffffffff], [0xffffff00, 0xff, 0xff000000, 0xff], 0x10, 0x8}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d6, 0x8, 0xf36b, 0x3}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x1000, 0x3, 0xfffffffffffffffd}, {0x5, 0x3f, 0x6dea}, 0x101, 0xd2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000001c0)={0x5, 0x8, 0x80000000, 0xffffffff, 0x2}) write$P9_RSTAT(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="5c0000007d0000000055000000000000000000000000000000038365a6c18d90d90000003f0000000000000000000000000000000000000000000c002f6465762f75696e70757400050073797a3100050073797a31000c002f6465762f75696e70757400"], 0x5c) 13:49:40 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702bff5ffff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1250.151944][T21422] input: syz1 as /devices/virtual/input/input80 [ 1250.160840][T21423] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.5 proc:/self/fd/3' not defined. [ 1250.252659][T21431] IPVS: ftp: loaded support on port[0] = 21 [ 1250.279588][T21422] input: syz1 as /devices/virtual/input/input81 13:49:40 executing program 4: r0 = gettid() r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x420000) write$cgroup_pid(r1, &(0x7f0000000040)=r0, 0x12) sched_setaffinity(r0, 0x99, 0x0) 13:49:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:40 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x65, 0x2, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = fanotify_init(0x0, 0x0) fanotify_mark(r4, 0x2000000000000011, 0x2, r0, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000440)='./file0\x00', 0x90002) sendfile(r5, r5, 0x0, 0x60000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 13:49:40 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70280ffffff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x1, 0x70, 0x0, 0x100000001, 0x7, 0x1, 0x0, 0x0, 0x10, 0x2, 0x80000001, 0x2, 0x80, 0x80, 0x401, 0x0, 0x9, 0x0, 0x2, 0x7, 0x6, 0xffffffffffffff00, 0x3, 0x8001, 0x6, 0x4, 0x1f, 0x6, 0x7fffffff, 0x81, 0xfffffffffffffff9, 0x8cc, 0x1, 0xfbec, 0xffff00000, 0x7, 0x800, 0xffffffffffffffc0, 0x0, 0x8d, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x25222, 0x401, 0x20, 0x7, 0x8, 0x100000000, 0x8}) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) mkdirat$cgroup(r1, 0x0, 0x1ff) [ 1250.586466][ T26] audit: type=1800 audit(1567172980.944:12794): pid=21452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=18121 res=0 [ 1250.680824][ T26] audit: type=1800 audit(1567172981.034:12795): pid=21458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=18121 res=0 13:49:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) ioprio_get$pid(0x1, r1) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x40000000004) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x80000) 13:49:42 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x100000000}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x2, 0x4}) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) fallocate(r0, 0xbc72452c9fc1622b, 0x50bec69d, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e20, @remote}}, 0x0, 0x8a8, 0x0, "afb719a84041e9e86a6e922b5e909e6ca9da115e28b10d2b531bfb77322b82c1420244f45b589dbdf6e6b86db784c03c3a6bc9c7c51dd449f801cdc1e4b4d72caeeb9890d51a52434b9b0a1dd9fa4fee"}, 0xd8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000716000/0x1000)=nil, 0x1000}, 0x1}) 13:49:42 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70290ffffff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000600)="a14ff15ce8398c064998c9c293032765878d50116e27fd7e509379fa4e2fa574942e151930416b64eee421b330c796b592526748c4e597140fec201f9e592fcc7f5b6a18b5c9cc736974b9bd43a6948ac59b0195e4bc6c0700f56eb9ec67903476b75143de97fcb3f1bd0904e01bc8629db0b888cbb50d66c07b520627531f72edd8230f9ddc63334f7bdd019b4d9c3eadfcf5", 0x93}, {&(0x7f0000000500)="da5c61a29f9e74c5c8d143bf407878d58b5288ce98c58514170a3703b959b1b6df77ffb2b5fda4f88248462e48d7099161849c8e2eb4b783b1b7c9bb4a332a034e5f64", 0x43}, {&(0x7f00000006c0)="9bb81f81a616a8b5b072a44f776696efa982357980931c51cdfcf996a42f1fe048aa4504f0a15a064a28d2784cde72bb10d868e8b01a5b2ea2c41032b1a4df480bdd50eab8b4e4781e86272a176f935bf466cc537c50b66cdcb21f666a758e19453143a9295207acb0f49a7fb09b281e810765bd2b47dcbf9b7369e5b4499fb93606536498f5b8810acabf0ede5eec8bdc4de98bbae0781903b4e75876524768d3b99c8b8a55868fe5ad9025cd9d7f7860c918c379dab8c6937891d07fc7309efdcbf68e4299d685df25fb10ce83732f463a42b338cbda0437fc9c", 0xdb}], 0x3) setpgid(0x0, r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x8000, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000800)=0x41) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, r1) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r4) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000240)="95c9e7ad96d33de061da4060272e0ef04897bfe0468c9ba8967126ebe592f5831b6183b209b59eba5dd5b3535e012c163b0d2b6aa61c63434f58cc85834428a4935f1d00feffeb743c28070f048e60d03d6dbc8419594b05959bd4a71260a764c45780f69837928dd0b6092812a6eea1e7fee8dc98689bd44e", 0x79, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000340)='autogroup\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@local, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0x0) getuid() openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x0, 0x0) shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x400000, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r6}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}}) 13:49:42 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) sync() pivot_root(&(0x7f00000005c0)='./file0\x00', 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000097eb05298abf010065b60ac2a115ae"], 0x0) syz_genetlink_get_family_id$net_dm(0x0) r2 = request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000580)={'syz', 0x0}, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000004c0), 0x0, r2) prctl$PR_SET_FP_MODE(0x2d, 0x3) sched_getattr(0x0, &(0x7f0000000100)={0x30}, 0x30, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="0000ff3a970100009100000002000000e90200001d0000000000000000000000f677e782f043e41f4b7140b2eb0a5a92e3ce332b7caabe568b7e0e929f1a824939d71dab67ed5d3c1a3c88124980a9fd33c49d9be2080fc317a3b0177d3e7d46c803aa3547df827915253747e45f6329bc65da000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000adfe0094f755ab80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006b7ca4e3630efff1e3fcee38383f000000000000000000000000000000000000000000000000000000000091ce526c2a4058ecf8439e16d18da30000000000000000000000000000000000000000000000000000000400"/1062], 0x418) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) [ 1252.348589][T21441] IPVS: ftp: loaded support on port[0] = 21 13:49:42 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702a0ffffff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x100, 0x0) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000080)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r3, 0x0) 13:49:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:43 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702b0ffffff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1252.618690][T21482] IPVS: ftp: loaded support on port[0] = 21 [ 1252.726473][ C0] protocol 88fb is buggy, dev hsr_slave_0 13:49:43 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702c0ffffff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x4, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, &(0x7f0000000200)=0x1, 0x4) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1252.993505][T21508] IPVS: ftp: loaded support on port[0] = 21 [ 1253.025832][T21507] hfsplus: unable to find HFS+ superblock [ 1253.066590][T21475] EXT4-fs (sda1): re-mounted. Opts: 13:49:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101400, 0x0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000280)) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80), 0x0) dup3(r0, r3, 0x80000) 13:49:43 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb", 0xd0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x200000008002) socketpair(0x1, 0x80000, 0x7, &(0x7f0000000340)={0xffffffffffffffff}) r4 = dup2(r2, r1) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e22, 0x10001, @mcast2, 0x5}, 0x1c) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x2]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, 0x0) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3, @tick, {}, {}, @connect}], 0x30) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x8b, 0x2, 0x9, "b241ddc9a65747be30e9ea24d884df5e", "6a039434155c2f6d09241998b2caedc1bddb79f16f9708c91a5fa5140eb89b47def3ca1a5ead502358fc07702b445d9db6de190876df3405d5b94f52c8f9a5379a070c1da3c4f9287ab37d7d0b33bd5e6cdaf1e90726a9084810a258583bbb81c27ebacff9a95b6e18d63d9806772f6a6f2fddf29e4b"}, 0x8b, 0x1) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 13:49:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:43 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702d0ffffff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffff010000000000000000f5648faf"], 0x1) 13:49:43 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x9, 0x800) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xd3a05d82a550dac5, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040), 0x4) r2 = dup(r0) read$char_usb(r2, &(0x7f00000003c0)=""/4096, 0xeb) r3 = geteuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x8002, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any'}, {@version_u='version=9p2000.u'}, {@aname={'aname', 0x3d, '/dev/null\x00'}}, {@nodevmap='nodevmap'}, {@uname={'uname', 0x3d, '/dev/null\x00'}}], [{@obj_user={'obj_user', 0x3d, 'keyringlo:userkeyring$posix_acl_accesseth0eth0[cpusetself'}}, {@uid_lt={'uid<', r3}}]}}) 13:49:43 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000017c0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1253.379152][T21529] Unknown ioctl 1074033728 13:49:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000000009ff240088fef3dc0b000000000d2b727e0000000000000000086fe6f5", @ANYRES32=r0, @ANYBLOB="04002000"], 0x20}}, 0x0) 13:49:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1253.528713][T21541] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 13:49:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:44 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x90a}, 0x20) write$binfmt_misc(r1, &(0x7f0000000000)={'syz1'}, 0x19f20) fcntl$setsig(r1, 0xa, 0x3b) [ 1253.824815][T21529] IPVS: ftp: loaded support on port[0] = 21 [ 1254.141688][T21529] Unknown ioctl 1074033728 [ 1254.201298][T21540] IPVS: ftp: loaded support on port[0] = 21 13:49:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x10800) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0xfffffffffffffe8c) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101000, 0x0) write$UHID_CREATE(r3, &(0x7f0000000340)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000280)=""/163, 0xa3, 0x43, 0x2, 0x3f, 0x83, 0x7f}, 0x120) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) connect$netrom(r3, &(0x7f0000000480)={{0x3, @null, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000500)={0x5, 0xb73796189dc5413f, 0x7, {0x6, 0x25eb30c9, 0x874, 0x7}}) connect$netrom(r3, &(0x7f0000000540)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000005c0)) 13:49:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffffff9, 0x6000) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x9) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x20, r2, 0x405, 0x0, 0x0, {0x14}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}}, 0x0) 13:49:44 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb", 0xd0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x200000008002) socketpair(0x1, 0x80000, 0x7, &(0x7f0000000340)={0xffffffffffffffff}) r4 = dup2(r2, r1) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e22, 0x10001, @mcast2, 0x5}, 0x1c) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x2]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, 0x0) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3, @tick, {}, {}, @connect}], 0x30) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x8b, 0x2, 0x9, "b241ddc9a65747be30e9ea24d884df5e", "6a039434155c2f6d09241998b2caedc1bddb79f16f9708c91a5fa5140eb89b47def3ca1a5ead502358fc07702b445d9db6de190876df3405d5b94f52c8f9a5379a070c1da3c4f9287ab37d7d0b33bd5e6cdaf1e90726a9084810a258583bbb81c27ebacff9a95b6e18d63d9806772f6a6f2fddf29e4b"}, 0x8b, 0x1) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 13:49:44 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000150108ffa13402c71400"/24], 0x14}}, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xffffffff) 13:49:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:44 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='wlan0lo.\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x800, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, r1, 0x5cfef3acecd4c454, 0x70bd2a, 0x25dfdbfe, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8000}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffffffffbff}, @SEG6_ATTR_SECRET={0xc, 0x4, [0xa9c4, 0x7]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x6, 0x5]}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x101, 0x4, 0x80000000]}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x40) 13:49:44 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000200000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0xa, 0x1, "e55d"}, 0x0) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x2018000, &(0x7f0000000180)='cpusetY%securitysecuritykeyringposix_acl_access\x00') 13:49:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1254.584113][T21585] Unknown ioctl -1069525410 13:49:45 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb", 0xd0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x200000008002) socketpair(0x1, 0x80000, 0x7, &(0x7f0000000340)={0xffffffffffffffff}) r4 = dup2(r2, r1) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e22, 0x10001, @mcast2, 0x5}, 0x1c) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x2]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r4, 0xc040564a, 0x0) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3, @tick, {}, {}, @connect}], 0x30) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x8b, 0x2, 0x9, "b241ddc9a65747be30e9ea24d884df5e", "6a039434155c2f6d09241998b2caedc1bddb79f16f9708c91a5fa5140eb89b47def3ca1a5ead502358fc07702b445d9db6de190876df3405d5b94f52c8f9a5379a070c1da3c4f9287ab37d7d0b33bd5e6cdaf1e90726a9084810a258583bbb81c27ebacff9a95b6e18d63d9806772f6a6f2fddf29e4b"}, 0x8b, 0x1) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) [ 1254.607329][T21585] Unknown ioctl 35147 13:49:45 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) recvmmsg(r0, &(0x7f0000002d00)=[{{&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)=""/218, 0xda}, {&(0x7f0000000300)=""/64, 0x40}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/166, 0xa6}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x5, &(0x7f0000002500)=""/193, 0xc1}, 0xe7e}, {{&(0x7f0000002600)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002940)=[{&(0x7f0000002680)=""/47, 0x2f}, {&(0x7f00000026c0)=""/161, 0xa1}, {&(0x7f0000002780)=""/251, 0xfb}, {&(0x7f0000002880)=""/74, 0x4a}, {&(0x7f0000002900)=""/18, 0x12}], 0x5, &(0x7f00000029c0)=""/26, 0x1a}}, {{&(0x7f0000002a00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002a80)=""/211, 0xd3}, {&(0x7f0000002b80)=""/51, 0x33}, {&(0x7f0000002bc0)=""/170, 0xaa}], 0x3, &(0x7f0000002cc0)=""/35, 0x23}, 0x4}], 0x3, 0x56a04c0f467a4711, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000002dc0)={@dev={0xfe, 0x80, [], 0x1c}, @rand_addr="5b0515ee4380c2811f3a0bcd333685ea", @rand_addr="f0e685b901d183d1820514c09bcda952", 0xee81, 0x2, 0x8, 0x500, 0xa2, 0x80, r2}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf00000000000000000000000017"], 0x80}}, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40000000000002b, 0x0) [ 1254.849463][T21580] Unknown ioctl -1069525410 13:49:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x6) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) connect$nfc_llcp(r1, &(0x7f0000000280)={0x27, 0x1, 0x0, 0x2, 0x1, 0x6, "5a1f5d7475ada973b105740b07f96737d628fb167a7c65d0bd5ffefd26e6aecbcfc7add952a8c34f1d8fbab51cb0e7117fad214927873c91408f3e3452060c", 0x14}, 0x60) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000080)={0x17, 0x2c, 0x14, 0x1e, 0xa, 0x25d, 0x3, 0x4e, 0xffffffffffffffff}) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:45 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000800000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0xe22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7f, 0x200000) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f00000001c0)={0x0, 0x3, 0x6, &(0x7f0000000180)=0x2}) r4 = dup3(r1, r2, 0x80000) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000300)={0x9c0000, 0x6, 0xd8, [], &(0x7f00000002c0)={0x990001, 0x7ff, [], @p_u16=&(0x7f0000000280)=0x7ff}}) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) listen(r2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 13:49:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000140)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000008fc0)={@loopback, 0x0}, &(0x7f0000009000)=0x14) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x1, 0x0) stat(&(0x7f0000009040)='./file0\x00', &(0x7f0000009080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000009100)={{{@in=@multicast2, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x8}}, 0x4e23, 0x800, 0x4e23, 0x1, 0xa, 0x20, 0x80, 0x2e, r2, r3}, {0xcf, 0x800, 0xd31, 0x1, 0xcff3, 0x7, 0x7ff, 0x97b}, {0x8, 0x3a9, 0x1f, 0x7}, 0x8001, 0x6e6bb9, 0x3, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x8000, 0x4d5, 0x2b}, 0x2, @in6=@rand_addr="8cfab377dcf378100fe960512da1f7c5", 0x3504, 0x0, 0x2, 0x6, 0xffff, 0xa01, 0x1000}}, 0xe8) mlock2(&(0x7f0000a4f000/0x4000)=nil, 0x4000, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000000)=0x5) sendfile(r1, 0xffffffffffffffff, 0x0, 0x320f) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) get_robust_list(r4, &(0x7f0000000240)=&(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)}}, &(0x7f0000000280)=0x18) ptrace$peek(0xfffffffffffffff9, r4, &(0x7f0000000100)) 13:49:45 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) recvmmsg(r0, &(0x7f0000002d00)=[{{&(0x7f0000000080)=@rc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)=""/218, 0xda}, {&(0x7f0000000300)=""/64, 0x40}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/166, 0xa6}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x5, &(0x7f0000002500)=""/193, 0xc1}, 0xe7e}, {{&(0x7f0000002600)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002940)=[{&(0x7f0000002680)=""/47, 0x2f}, {&(0x7f00000026c0)=""/161, 0xa1}, {&(0x7f0000002780)=""/251, 0xfb}, {&(0x7f0000002880)=""/74, 0x4a}, {&(0x7f0000002900)=""/18, 0x12}], 0x5, &(0x7f00000029c0)=""/26, 0x1a}}, {{&(0x7f0000002a00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002a80)=""/211, 0xd3}, {&(0x7f0000002b80)=""/51, 0x33}, {&(0x7f0000002bc0)=""/170, 0xaa}], 0x3, &(0x7f0000002cc0)=""/35, 0x23}, 0x4}], 0x3, 0x56a04c0f467a4711, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000002dc0)={@dev={0xfe, 0x80, [], 0x1c}, @rand_addr="5b0515ee4380c2811f3a0bcd333685ea", @rand_addr="f0e685b901d183d1820514c09bcda952", 0xee81, 0x2, 0x8, 0x500, 0xa2, 0x80, r2}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf00000000000000000000000017"], 0x80}}, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x40000000000002b, 0x0) 13:49:45 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000a00000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$inet6_int(r1, 0x29, 0xcf, &(0x7f0000000000)=0x80000000, 0x4) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x401}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8001, 0x600080) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000140)={0x1, 0x6000, 0x3, 0x55862b18, 0x5}) bind$x25(r1, 0x0, 0x0) close(r1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0x47, "b4fe1062860d48061e31abcb8749eeab8337aef0f2d6c50cb9053537ed28dbf2bf9eba3d57fef3fa6191a842444b0be9b45ce9413254adf9e963b2bd6bd4277c4f87e9fad00e42"}, &(0x7f0000000200)=0x4f) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={r3, 0x100000000}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'bridge0\x00'}, 0x18) 13:49:45 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000c00000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000700)) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1255.174733][T21619] IPVS: ftp: loaded support on port[0] = 21 13:49:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff400443c8, &(0x7f0000000280)) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @local}}, 0xfffffffffffff4f1, 0x6, 0xfffffffffffffff8, 0x760}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x9}, &(0x7f0000000180)=0xc) 13:49:45 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 1255.508941][T21631] IPVS: ftp: loaded support on port[0] = 21 13:49:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) 13:49:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xb46cbf4f26917e75, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x480004, 0x92) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0xfffffffffffffd83) r2 = syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) 13:49:46 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000d00000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:46 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) migrate_pages(r0, 0x0, &(0x7f0000000000)=0x25, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$CAPI_GET_MANUFACTURER(0xffffffffffffffff, 0xc0044306, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f00000000c0)) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000001c0)={'TPROXY\x00'}, &(0x7f0000000200)=0x1e) ftruncate(r4, 0x200004) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000180)=0x8, 0x4) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) getgroups(0x5, &(0x7f0000000040)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01]) ioctl$TUNSETGROUP(r3, 0x400454ce, r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000100)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x3, 'lblc\x00', 0x10, 0x100, 0x42}, 0x2c) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 13:49:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000700)) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:46 executing program 1: accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000080)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x178, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x454000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @raw_data=[0x9, 0x2, 0x3, 0x1, 0x100, 0x5, 0x800, 0xb6d, 0x8, 0x0, 0x3c3800000000, 0x10000000000, 0x3, 0xda0, 0x5, 0x5, 0x1, 0x0, 0x3, 0x4, 0x80, 0xb27b, 0x6, 0x80, 0x7, 0x2, 0x6, 0x9, 0x1, 0x0, 0x0, 0x81]}) prctl$PR_SET_UNALIGN(0x6, 0x2) msgget$private(0x0, 0x9) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 13:49:47 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000e00000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) write$capi20(r1, &(0x7f0000000080)={0x10, 0x34d, 0x1, 0x80, 0x6, 0x7}, 0x10) getgid() getgid() getgroups(0x1, &(0x7f0000000b40)=[0xffffffffffffffff]) execve(0x0, &(0x7f0000000280)=[&(0x7f0000000140)='TIPC\x00', &(0x7f0000000200)='cgroup2\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000380)='vmnet1em1-\x00', &(0x7f0000000480)='self\x00']) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {0x2, 0x3}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x2}, {}, {}], {}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000300)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000a40)={0x14, r2, 0x401, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) [ 1256.773063][T21664] IPVS: ftp: loaded support on port[0] = 21 13:49:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000700)) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1256.839829][T21649] FAT-fs (loop1): bogus number of reserved sectors [ 1256.865792][T21649] FAT-fs (loop1): Can't find a valid FAT filesystem 13:49:47 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702001000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1256.984313][T21668] overlayfs: lowerdir is in-use as upperdir/workdir 13:49:47 executing program 1: setxattr$system_posix_acl(&(0x7f0000000140)='.\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000005c0), 0x24, 0x0) pipe(&(0x7f0000000000)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) rmdir(&(0x7f0000000240)='./file0\x00') 13:49:47 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702003000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1257.178049][T21674] overlayfs: lowerdir is in-use as upperdir/workdir [ 1257.299612][T21688] IPVS: ftp: loaded support on port[0] = 21 13:49:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) listen(r1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000280)) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:47 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702005000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') open(&(0x7f0000000000)='./file0\x00', 0x40001, 0x80) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000340)=0x4) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 13:49:47 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_mark(r0, 0x2, 0x1000, r0, &(0x7f00000003c0)='./file0\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x70835840cf9f6abb, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000440)='.md5sumwlan0eth0{\\cpuset#*GPL]*\x00', &(0x7f0000000480)='./file0\x00', r1) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='hfsplus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x18400000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, r2, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x303d}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8f3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffe}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xf8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f00000001c0)={0x7a, ""/122}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x1, 0x0) 13:49:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") sendmsg$key(r0, &(0x7f0000b6dfc8)={0x512, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) 13:49:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) [ 1257.504034][ T2510] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 0 [ 1257.515535][T21704] hfsplus: unable to find HFS+ superblock 13:49:47 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702006000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1257.554889][ T2510] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 0 [ 1257.569757][T21709] hfsplus: unable to find HFS+ superblock 13:49:47 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x40000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x10002, 0x3, 0x1000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) getpeername(r0, 0x0, 0x0) 13:49:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500), 0xc, 0x0}, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000340)={0x6, 0x1}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x54, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x5, 0x3, 0x0, 0x3, 0x6, 0x0, &(0x7f0000000780)=""/4096, 0x6, 0x0, 0xffff}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000580)=""/85, &(0x7f0000000600)=0x55) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0)=""/59, &(0x7f0000000540)=0x3b) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000006c0)={0x3, 0x2, 0x4000, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_NMI(r3, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:49:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1257.698961][T21717] IPVS: ftp: loaded support on port[0] = 21 13:49:48 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702006f00000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1257.986665][T21716] IPVS: ftp: loaded support on port[0] = 21 [ 1258.240360][T21715] IPVS: ftp: loaded support on port[0] = 21 13:49:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) getpeername(r2, &(0x7f0000000580)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000600)=0x80) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000800)={{{@in=@empty, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000900)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000a80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000cc0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x13000200}, 0xc, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x18c, r3, 0x0, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x170, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f033e73}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000380)=0x80000000) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={r8, @in={{0x2, 0x4e20, @empty}}, 0x40, 0x1000, 0x5, 0x100000000, 0x40}, 0x98) dup3(r0, r2, 0x80000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/btrfs-control\x00', 0x2040, 0x0) 13:49:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) 13:49:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5}, 0x1c) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000080)={0xb, @pix_mp={0x8, 0x7f, 0x3432564e, 0x8, 0x5, [{0x6, 0x10000}, {0x3, 0x4f}, {0x8, 0x85}, {0x0, 0x3ff}, {0x100, 0x4}, {0x7aeb, 0x100}, {0x7, 0x9}, {0x1ff, 0x1}], 0x800, 0x9654d96, 0x4, 0x2, 0x4}}) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 13:49:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fsetxattr$security_ima(r1, &(0x7f0000000080)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0406005ac00000"], 0x2, 0x0) fallocate(r1, 0x0, 0x0, 0x958) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 13:49:49 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702007000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1259.347885][ T26] audit: type=1804 audit(1567172989.704:12796): pid=21748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir266459818/syzkaller.CAQkAT/362/bus" dev="sda1" ino=17361 res=1 13:49:49 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000a000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x208180, 0x0) r2 = socket$inet(0x2, 0x6, 0x0) fgetxattr(r1, &(0x7f00000003c0)=@random={'security.', '/dev/bus/usb/00#/00#\x00'}, &(0x7f0000000400)=""/173, 0xad) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7b36, 0x88000) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x5, 0x401, 0x4, 0x364, 0x3, [{0x1, 0x400, 0xe6e2, 0x0, 0x0, 0x800}, {0x9, 0x3, 0xfd3, 0x0, 0x0, 0x400}, {0x6, 0x1, 0x3, 0x0, 0x0, 0x802}]}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) mq_notify(r3, &(0x7f0000000200)={0x0, 0x3a, 0x4, @tid=r4}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB='ra', @ANYRES32=0x0], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x6, &(0x7f0000000000)={r5, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x98) [ 1259.521403][T21757] IPVS: ftp: loaded support on port[0] = 21 13:49:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1259.587173][T21746] IPVS: ftp: loaded support on port[0] = 21 13:49:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x371, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x109440, 0x0) 13:49:50 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000c000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:50 executing program 5: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2000, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x2, r2}) sendmmsg$inet6(r1, &(0x7f0000001540)=[{{&(0x7f0000000140)={0xa, 0x4e23, 0x1, @loopback, 0x3}, 0x1c, &(0x7f0000000200)=[{&(0x7f00000001c0)="0ba632a7e0d13e6b05a6066fca37df68681063d079865cfd565448781f656edf0f65ad247d4340409696484ef34d2e2680f1b7b857fe802f1751eea67682", 0x3e}, {&(0x7f0000000280)="c2cd29a651a26b05822eb9b8fdfd19072a265b63e1987ced4abb6566a887e42e293308a7d6b9e99910b63cad435d39343afb6c48bec22740589a48e63451e9f9d2bf19529a426b7a33fbcb10610f92e5b52954ad304181a0e8316e66f7d26390a22fbf21db3af926c43d2eef8c4fb3c887a9095b881054129418ecb04319c37d3ebcfb38ee2ca30829b103ae6b5d7178a71b49e61218dd5f7b7515784ff7387593069d44f61787d6bd9b2e920131364049c254d96a38d87ca2cfd8eb4413952ba054613f", 0xc4}], 0x2, &(0x7f0000000380)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x2c, 0x0, [], [@ra={0x5, 0x2, 0x2}, @pad1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfe}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x29, 0x5, [], [@calipso={0x7, 0x20, {0x4, 0x6, 0x5, 0x0, [0x1, 0x6, 0x1]}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x80}}, {{&(0x7f0000000400)={0xa, 0x4e21, 0x0, @local}, 0x1c, &(0x7f0000000840)=[{&(0x7f0000000440)="99a316078a4d8907bd42994df6356fa31e54e21bb26051c4d3ef9c758bad8e9bf174d57237bdc380e57ce22c60426d2c9b90c77632ddc69b08b25fbca764564688af1d70f237a48bcf0026fea1236d4f8a7c7381d00b7f70c7fe1c069f72da510565c6b4960015507e5dcd4aef0dfa7d6d3a44a3c2b7e0e05a363b95", 0x7c}, {&(0x7f00000004c0)="d17548fb561eb42ad1f3cf4131d8161bb0d2ac8ace59b0185ee04c354433da8079c0a1fb31072baa4bc25cc5977711e62e2eb623e0239a16e1dd7d1313df8b2b4db0c1e61bc53d015a8c078d2fd6851e1b671ae39fee1b61ee42ae4008d9f8772a8b46cc0934f7eddcabd2ac82d5547f6110a13ce724fbb0d49e14006fc7652b4e9c8a913b7711afaccd19887b9f05cda3239f12e03e6ab5f218201212d45332c6f767cd01802040602a811319b9cced253239c2c9c066e344719c353a2a", 0xbe}, {&(0x7f0000000580)="7d8a373ef8b2458a5ed6db060d4acf5bc8b668d66eef51abb6f55b89df399f5a9946e1d92958efae9afa07c4dd595c7361bba274f7f33a4a8a7aca1508b2353ad608822bd813a0d9b31a508e30baf4390570140bb72e4610871d23ef611a97bc98031af1c52c13a901100b561f6dd3a63dfed0eabd56df72d36c66211f8765f8c347a2d4", 0x84}, {&(0x7f0000000640)="942099794b010b2e347662c4958623ae7902a8517442ef637e97dc2f5cefe553d781494c84fff07f4ee827755e0b652d2d266e2786ec0e2dfb04df7a272c3890dc74f2753fcd77167ae146bece4e32aa3659406b03630a16270c89aaa9", 0x5d}, {&(0x7f00000006c0)="70876c562d17f235d8972682ca6bf5d8b9b084d55db9fc39d28a45f35c5f2eb8715ab2db009a240b64fe6b6c12af99d92d6bfaa4a168acc768ffdebdf323f7f60fee4f4352be4fddbeaf7b6193397a1dc39d367093716bf44de8372ed931bb731fc66da62b5875ded1cb9e7eb5099eafa98b13d7f8f286007c", 0x79}, {&(0x7f0000000740)="06435bb91610ad1cc512ce6922380b84ebfd449cdaa71d16aac9f9bfd90c03b266ebd2a75dcfa1b6562f1a05d33307ea658b041db8cb5c2ef1d5c0dda37c72b8e349b1f5a24943d9298a5ea0352a22aa890c07433323b78d7f5f7f693fefe3587d8ab6b1f089eb059e97d33c5bb228c09dc143196e59880554caf9c5c63cc861840b508d373ee670428982267e41f02998c5e839bb1ec7742f258e1cc11e6330b7c258d1848b5d06abb2395d4974c72c1758100356855a21a265c672a8ee8fa7e3235e45a746f47544a63650ea0812bffc5dd8ea0f2f016217a5f116d4257d7ce1", 0xe1}], 0x6, &(0x7f00000008c0)=[@rthdr={{0x28, 0x29, 0x39, {0x8, 0x2, 0x0, 0x5, 0x0, [@mcast1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x400}}, @rthdr={{0x48, 0x29, 0x39, {0x2e, 0x6, 0x1, 0x5, 0x0, [@mcast2, @ipv4={[], [], @local}, @dev={0xfe, 0x80, [], 0x1a}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x25}}], 0xa0}}, {{&(0x7f0000000980)={0xa, 0x4e21, 0x7902, @empty, 0x4}, 0x1c, &(0x7f0000000b00)=[{&(0x7f00000009c0)="dbb632c2782cddd0d21beb5eaccaf9e214917d701290c27cc06d323b44221a383945146fb520b044432e0eaced3326a63dbfce15d36928855cf00d2526fccbffa255fde5da1ed73a07d3d30760f92d3c28015de8a8baca8fdf905ab232ec00bd5a714d187e18bfbb056b4c731fa5dd05e893c23c1cf085f7f2b2e3f3b9df356229eeee594fe9ec7848fb9aef1a7c4054eead5ef516cd959ee8b2f7d94ebd5d5c74b3bb4547d648727b862e7909dbc9aefba847e8d68c338ccc1a0f092599311b6c7a07601df886599897fb42f4182ff8c8c8158b10417b94082408", 0xdb}, {&(0x7f0000000ac0)="2be1a8f0441c47eca3f5", 0xa}], 0x2, &(0x7f0000000b40)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1d, 0x2, 0x2, 0x100000001, 0x0, [@mcast1]}}}, @dstopts={{0x18}}, @dstopts={{0x78, 0x29, 0x37, {0x8, 0xb, [], [@ra={0x5, 0x2, 0x3}, @jumbo={0xc2, 0x4, 0x9}, @calipso={0x7, 0x38, {0x1, 0xc, 0x6, 0x8, [0x200, 0xffffffff, 0x7ff, 0x40, 0x7fff, 0xffff]}}, @hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x0, 0x1, [], [@pad1, @enc_lim={0x4, 0x1, 0x100000000}, @enc_lim={0x4, 0x1, 0x1ff}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x110}}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000c80)="fb5a1fc24c", 0x5}, {&(0x7f0000000cc0)="ebabf389e4cce940104cf2cee10fe3f8517bc6f63be78ae98cb09c695746004e5065e8df427d1c50326a45a304d48559f5815b743c9f4c9d4c812d80926739efb55408269ce7112b5f0a40a810beead3c5c14382e3a6e299916070204e0cb4b939610867c01e886fab38ea56e9c2887e68aeb8e1f433f367eca2f531fbd3f7226663e562b09556fbac629804a9f541bd6ea1b2", 0x93}], 0x2, &(0x7f0000000dc0)=[@hopopts_2292={{0x50, 0x29, 0x36, {0x5d, 0x7, [], [@hao={0xc9, 0x10, @loopback}, @enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @empty}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}}}, @hoplimit_2292={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0xff}}, @rthdrdstopts={{0x80, 0x29, 0x37, {0x7f, 0xc, [], [@calipso={0x7, 0x10, {0x8000, 0x2, 0x4, 0x9, [0x0]}}, @pad1, @enc_lim={0x4, 0x1, 0x3}, @calipso={0x7, 0x38, {0x1ff, 0xc, 0x5, 0x6, [0xffffffffffffff80, 0x7, 0x2, 0x100, 0x93ab, 0x7000]}}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x15}}]}}}, @flowinfo={{0x14}}, @dstopts={{0x130, 0x29, 0x37, {0x6, 0x22, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @jumbo={0xc2, 0x4, 0x4}, @padn={0x1, 0x1, [0x0]}, @generic={0x1ff, 0x5b, "32971199b6ca99ed3b98d38663d5f9e62c847bd4677bfac5a00371cec67fa178e50c95d1f2e14a5d9997074ea954dd49bbafcbe764c20680f5d1758057b76c163d69e6afad34783ea3765a259c703faf10ab3e9ee383efcb917510"}, @generic={0x6, 0x8b, "7308bacfc145bd4c97d98944ea09280b5a3ae2e114051d4079d7802061cba91f6b771a8c79fac9fc01fd54250e670d30781a4795d7af38f6154798add46f6926646acb005024e74b1e58ec0636d6b681062075b05c8b30ac53d1607a1fbaa326a7d2ed1ec2dd2f43fab34bfeac4c7e4e19a1052a02752769eaea57e685eb4dda13b3723e5f7d137a51452d"}, @hao={0xc9, 0x10, @empty}]}}}], 0x248}}, {{&(0x7f0000001040)={0xa, 0x4e21, 0x5, @empty, 0x7e4}, 0x1c, &(0x7f0000001100)=[{&(0x7f0000001080)="9e1ec41cf99085", 0x7}, {&(0x7f00000010c0)="f3d68ce6d0ae2bbf32575ede", 0xc}], 0x2, &(0x7f0000001140)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffffffffffffe}}, @hopopts={{0x28, 0x29, 0x36, {0x4, 0x1, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x544}, @jumbo={0xc2, 0x4, 0x235}]}}}, @dstopts={{0x20, 0x29, 0x37, {0x2c, 0x0, [], [@pad1]}}}], 0x78}}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000011c0)="3231dbb40ba6", 0x6}, {&(0x7f0000001200)="7aa596db9722d79da9242b008a7b48", 0xf}, {&(0x7f0000001240)="161e8aee2405692bf00f", 0xa}, {&(0x7f0000001280)="d13b92abab27", 0x6}, {&(0x7f00000012c0)="73cd38fdc8a6", 0x6}, {&(0x7f0000001300)="390155ff9d86581a0fbe74cdc11e67613a87bffd642c257ddf9a80a57ab384e84b9df3696a8115348a640425c6926d2ac5367968dbd8d7f3ff3993e0ffaae22701429535d624ec5f43f2ff906da3d3e542325dfaeb77851604d28b462dae38c754fa538c2ffcae3552430b1ca5572394cef3abf44636bb2ac5802650d4bd2a50f0de10adfbf6", 0x86}], 0x6, &(0x7f0000001440)=[@dontfrag={{0x14, 0x29, 0x3e, 0x100000001}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfc}}, @flowinfo={{0x14, 0x29, 0xb, 0xff}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x87, 0xe, 0x1, 0x6, 0x0, [@dev={0xfe, 0x80, [], 0xf}, @ipv4={[], [], @loopback}, @empty, @empty, @ipv4={[], [], @broadcast}, @loopback, @dev={0xfe, 0x80, [], 0x20}]}}}], 0xd0}}], 0x6, 0x20000000) sendmmsg$inet6(r0, &(0x7f0000004240)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="ce3834a9c06d2c2b257a4447b335c1a8"}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000180)='i', 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004340)=[@dontfrag={{0xc0}}], 0x18}}], 0x2, 0x0) [ 1260.060087][T21762] IPVS: ftp: loaded support on port[0] = 21 13:49:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) 13:49:51 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000d000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000300)="dfc87a4d2dcf3e261699f24f3fbfe54d338c934e61eb28e6bad8a0e9986b3b0210a86cab2bf5b5ca7b18232fa87edc733ce5f5cf2251bca01bb115ce5e85c316bbb9070557d359d72b0389ccecb4a04e3f78d93dbcfb916bf7f8f3a9408d7206be1bedb40a825c7447e59bc4647af09ac7ae86762b573afe432acba5a92dfa66ac6b8651b0d3a4a61ea56fab813654cee3be1c365ed59956") r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20080, 0x0) recvmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000040)=@sco, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f0000000100)=""/203, 0xcb}], 0x2, &(0x7f0000000240)=""/15, 0xf}, 0x1) shutdown(r0, 0x1a0ffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r1, &(0x7f00000003c0)="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", &(0x7f00000004c0)=""/198}, 0x18) 13:49:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:51 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) bind$bt_hci(r0, &(0x7f0000000240), 0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0x2) listen(r3, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000), &(0x7f00000002c0)=0x8) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000180)={'bcsh0\x00', {0x2, 0x4e20, @local}}) r4 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x3}, 0x28, 0x2) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x61, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000fec000/0x12000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fef000/0x2000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000000080)="5ee7a1b287aedfdecbb909f210b5c4f84991c5da03a4b71715335e7b93797827952bfc4676559d44b011109bddb2597825f7b5158c943c6f24f3b0afa2b6c9ae6c4c", 0x42, r2}, 0x68) semget(0x3, 0x4, 0x200) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000300)=0x3) ioctl$FS_IOC_FSGETXATTR(r4, 0x8108551b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 13:49:52 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000e000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1261.692272][T21807] IPVS: ftp: loaded support on port[0] = 21 13:49:52 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000020000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:52 executing program 5: r0 = socket(0x9, 0x2, 0x20) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00'}) socket$pppoe(0x18, 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x1d, 0x4) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 13:49:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000000)={0x321, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0xfffffffffffffd20) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/35) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:49:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:52 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000030000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1262.012260][T21809] IPVS: ftp: loaded support on port[0] = 21 [ 1262.140485][T21803] IPVS: ftp: loaded support on port[0] = 21 13:49:52 executing program 4: syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x0, 0x2) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) unshare(0x8000000) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000040)={0x80, 0xc5, 0x9, @random="e6c9d1256b9e", 'vcan0\x00'}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:49:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x4800c2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x8000}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5414, &(0x7f0000000080)) 13:49:52 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x82600) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x10001}, 0x0) pidfd_send_signal(r0, 0x4, &(0x7f00000003c0)={0x6, 0x895, 0x1}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[], &(0x7f0000000280)=""/237, 0x0, 0xed, 0x1}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') getsockopt$llc_int(r1, 0x10c, 0x0, 0x0, &(0x7f00000001c0)) [ 1262.985363][T21846] overlayfs: filesystem on './file0' not supported as upperdir 13:49:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) r2 = dup2(r1, r0) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f0000000280)={0x0, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x27}}}}, 0x108) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) r4 = dup3(r0, r3, 0x80000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000080)={0x3}) 13:49:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xba6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/group\xca\xectat\x00<\xbet\x19\xc1L\xa6\xa4\x04\x1a\xe5#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0J$\x8f\xb1\x9d\x16Z\x9e%@\xceN\x1d]\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x00\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5v\x00\x00', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f0000000380)={0x9, "6ed403642120cfe75f870ef787ab6b414f4d2ca7d02ef078852fb5da1b20bb8c", 0x1, 0x5fd8, 0x8, 0x50007, 0x4}) r3 = dup(r2) r4 = dup3(r0, r0, 0x80000) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000340)={0x0, 0x30323953, 0x6, 0x0, 0x1, @discrete={0x8}}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ppoll(&(0x7f0000000400)=[{r1, 0x2081}, {r2, 0x4}, {r4, 0x80}, {r3, 0x44}, {r4}, {r4, 0x8}, {r3, 0x4}, {r0, 0x119}], 0x8, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f00000006c0), 0x8) recvfrom$netrom(r4, 0x0, 0xfffffffffffffca3, 0x63, &(0x7f0000000780)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @bcast]}, 0x48) 13:49:53 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200003f000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:53 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x40) semctl$IPC_RMID(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x7) unshare(0x40000000) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) r4 = dup(r0) setsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f0000000080)=0x1, 0x4) 13:49:53 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x5207, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2001, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) read$char_usb(r0, 0x0, 0x0) 13:49:54 executing program 4: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='cgroup2\x00', 0x0, &(0x7f0000000180)='n)\xf4\xb2B\xe0wt\x80\xc5\xfdU\xa8\x84\x05\xa0\x01i\xbe\x8c\xedxQ\xa1\xbb\x92\xf7\xf5x\xacu\xc0\x1e3\xd4\n\x85)^\xe3\xe9\v\x1c\x84\xd2_\xcf\xacA\xbe!\xf6\xd4\xa7\b~') openat(r0, &(0x7f0000000000)='./file0\x00', 0x4000, 0x100) 13:49:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000040000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1263.623589][T21861] IPVS: ftp: loaded support on port[0] = 21 13:49:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000050000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1263.784123][T21866] IPVS: ftp: loaded support on port[0] = 21 [ 1263.870044][T21872] cgroup2: Unknown parameter 'n)ô²Bàwt€ÅýU¨„ i¾ŒíxQ¡»’÷õx¬uÀ3Ô [ 1263.870044][T21872] …)^ãé „Ò_ϬA¾!öÔ§~' 13:49:54 executing program 1: capset(&(0x7f0000000300)={0x20080522}, &(0x7f0000000340)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x894c, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x1, 0xf237, 0x5, 0xfffffffffffffffc, 0x0, 0x1f, 0x80, 0x5, 0x0, 0x8, 0x0, 0x7fff, 0x0, 0x3, 0x7f, 0x8, 0x120000, 0xfffffffffffffff7, 0xffff, 0x5, 0x3ff, 0x2e, 0x155f8512, 0x8, 0x3, 0x6, 0x5, 0x7fffffff, 0x7fffffff, 0xb0, 0x9, 0x9, 0x400, 0xffffffffffffffc1, 0x2, 0x846f, 0x0, 0x0, 0x3, @perf_config_ext={0x7fff, 0x9}, 0x4, 0xd147, 0x8, 0x9, 0x8, 0x7, 0xef1}, r3, 0x3, r2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)=ANY=[@ANYBLOB="180620000600200026bd700040cb1f0500d13f6e6ebb57bbc7cb3d862e2c8743aab2a7871a10c774a18aca5c251fc4fdd95456d5b8fb6c5c267f6087a1ef9a9428abbc474b7d518749decd9428be70ce945a7a4ccc5d9b9978d43386064b1fd72bbe", @ANYRES32=0x0, @ANYBLOB], 0x18}], 0x1}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000580)={{0x0, 0x1, 0x2, 0x5, 'syz0\x00', 0x1}, 0x1, [0xfff, 0x1, 0x3, 0x1, 0xffff, 0x6855, 0x80000001, 0x9, 0x100, 0xffffffffffffa9f8, 0x9, 0xfffffffffffffffe, 0xda, 0x3, 0x0, 0x8, 0x2, 0x3, 0x2, 0x6, 0x7c0, 0x3, 0x355, 0x5, 0x9f5, 0x0, 0x7ff, 0x6e, 0x6, 0x5, 0x40, 0x9, 0xc0f, 0x8000, 0x5, 0x3, 0x8, 0x2, 0xffffffffffffff80, 0x7ab, 0x8, 0x0, 0x800, 0x20, 0x0, 0x1, 0x71, 0x82, 0x0, 0x0, 0x3, 0x5, 0x4, 0x7, 0x9, 0x20, 0x6, 0x8, 0x1, 0x0, 0x81, 0x86, 0x401, 0x5, 0x2, 0x8, 0x401, 0x7fff, 0x200, 0x101, 0x8a, 0x5, 0x100000000, 0x5, 0xac6, 0x7, 0xd1, 0x1ff, 0x4, 0x6, 0x4, 0x6, 0x0, 0x4, 0xa5, 0x85, 0x7, 0x800, 0x0, 0x3, 0x81, 0x641f0076, 0x400, 0xc40, 0x80000000, 0x8001, 0x8, 0x1, 0x1, 0xffffffff, 0x4, 0x41, 0x7ff, 0x7fffffff, 0x2000000000000000, 0x1, 0xd19, 0xfffffffffffffffa, 0x1, 0x2, 0x9, 0x20, 0x0, 0x24, 0x0, 0x3, 0x0, 0x2, 0x6, 0x100, 0x81, 0x80000001, 0x2, 0x2, 0xa20d, 0x4, 0x5, 0xbe], {0x0, 0x1c9c380}}) r4 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000000)=0x5) recvfrom(r1, &(0x7f0000000400)=""/10, 0xa, 0x40, &(0x7f0000000440)=@in6={0xa, 0x4e21, 0x3f70, @dev={0xfe, 0x80, [], 0xf}, 0xa947}, 0x80) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) r7 = dup2(r6, r5) ioctl$KVM_SET_CLOCK(r7, 0x4030ae7b, &(0x7f0000000340)={0x0, 0x1}) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r8, 0xc0345642, &(0x7f00000002c0)={0xfffffffffffffff7, "99a0d16b5260270274463a69b3acab616a799eb29dba9d4811d8c1672a0d2982", 0x1, 0x1}) prctl$PR_SET_PDEATHSIG(0x1, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000080)='memory.max\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/204) r9 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1602, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r9, 0x40505331, &(0x7f0000000040)={{0x4, 0x1}, {0x5, 0x7}, 0x7, 0x4, 0x101}) [ 1263.956866][T21879] cgroup2: Unknown parameter 'n)ô²Bàwt€ÅýU¨„ i¾ŒíxQ¡»’÷õx¬uÀ3Ô [ 1263.956866][T21879] …)^ãé „Ò_ϬA¾!öÔ§~' 13:49:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000060000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1264.093411][T21861] IPVS: ftp: loaded support on port[0] = 21 [ 1264.256930][T21869] IPVS: ftp: loaded support on port[0] = 21 13:49:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x400) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d6c0bcfe47bf070") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r3 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000000)={@empty, r2}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x3}]}]}, 0x28}}, 0x0) 13:49:54 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140), {0x1ff, 0x7fff, 0x20303159}}) chdir(&(0x7f0000000000)='./file0\x00') 13:49:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200006f000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040)=0xa, 0x4) r1 = fcntl$getown(r0, 0x9) waitid(0x2, r1, &(0x7f0000000140), 0x20000000, &(0x7f00000001c0)) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20040008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1b) 13:49:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000070000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x801, 0x84) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xa}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) [ 1264.548941][T21897] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:49:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000b40), &(0x7f0000000b00)=0x0, &(0x7f0000000300)) fchownat(r1, &(0x7f0000000040)='./file0\x00', r3, r4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000000000005) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/.ev/sequencer2\x00', 0x20002, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video0\x00', 0x2, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x5, 0x10000, 0x6, 0x5, 0x2, 0x17ebef10fa9c8c0, 0x3, 0x114, 0x40, 0x30, 0x100, 0xe9c, 0x38, 0x1, 0x0, 0x6, 0x9}, [{0x5, 0x3, 0xdf3, 0xfff, 0x4, 0x28f, 0xfffffffffffffffe, 0xd}], "0dcae92f879833014d62289ec0331c2109eaf689b00d2e95727d0e020627921f634de0baad52d3fb5eef3d1532ee8eccc0002c13b4fd18e3eb0d2f3038527ad8a759e7b7eaea7f8b308b7caa089eefff1dbcdde9f367b68517d06d74", [[], [], [], [], [], []]}, 0x6d4) 13:49:55 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000100)) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000140)={0x2, 0x3, 0x3, 0x1, 0xff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 13:49:55 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200ff9f000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3, 0x500) write$P9_RMKDIR(r3, &(0x7f0000000280)={0x14, 0x49, 0x2, {0x81, 0x1, 0x3}}, 0x14) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:55 executing program 1: unshare(0x400) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') setns(r0, 0x0) 13:49:55 executing program 4: syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x80000001}) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000140)) 13:49:55 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000ff000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:55 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000580)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)='keyringlo\x00\xf9\xe32\x10\xd4w\xf0\xfb\xca\x82\xbf\xc2K\x1c\x95\xaaPv\xben\x8b\xd7\xaf\fn\xdd\xf0\x18\'\"\xfe\xff+\x9a\x00\xce\xf0\xfbi\x84\xe5``\xde\xb0\x90\x81]\x9e\xf9\xfb\xc9\xfe\xbc\xd2e}\x98\x06_c\x0f\x14\xbc\xe0\xd3.,\x81\xa5\xbf4\xf6\x03D\xd5\xd1tU\xfd\x1b\x7f&`+t\xc3F<\x13\xbf\xbd\xc2c\xe8\xe6\xc0\xe4\xfd\xb0\xb3S\xd9n\x05\xf4\xaf\xda\xa5\xe9\xa21\x1e\v\x047\xb3\xd7yO\xd3>\xcc\x81\x1fm\xb8\x06\xdaT\xef+:\xc6l\xdbA\xbd\xb6B-8\x9e\xf5;\x01l\xb1\'\xcb\xae|ggX\xe1\x99u$\xeaoW\xfe\x8e1X\xa0\xb8\x939\xf5Mm\x86\xb3\xf1\xd5\xebN\x93.J\"\xb6\xda\r\x1d>\xaf\xf99\xd91 \x19\xfc\x98\x82\xc3{d\xcc?\xf3\xe0\x01(\x1cv#\xc8\x91\x16\xa7\xdd\x8a\xefj!\x10\xb5\xc8\"q}\x7f\x9d\x03\x01a(\xean\x95\xa6ok\xb4\x17X;\xf0\xddT\xd1\xcd\x01[0\xf2\x96\xd8\xf6\xe5\xeeC\x8b&|\xf4\x03\x9a\x90_j\x83\t\x92v\x96\xe6\xdc\xfb\xa6\x1b\x16\x10u\x85\xa2\xa1\x88\xba\x10\xeaWk\xd6\x99\xbc\x90x\xd3\xed\xec\xcf\xbd\xbf\xc5_C\xdd\x899\x9e\xd3XD\xe7{\xf9[\xa7\x9f\x17\xbb\x93\xbf\x85\xe1l\xf6*\x13\xb5,%\xc2R\xb7\xe4QO\x01\x1c\x9d\xa6\xb2\xcb\x7f\x19\b\xfeX\xceer\x16\xb2\xa5\x19\x0e\nrp\x99\xab\r\x83\xcc\xdd\xdb\xaag\x92\xf2\xbe\xbf\x9a\x8bqk=\xd8\x8d\x15\x90\xc1\xd4\xfc\xc1\xe8\x18\xdc\x822F\xd6\xd5\x9eD\x9f\xcf\xf4\x97\x0f\xf8\x88\xefc\xc1\'}v\xc8Y\xf6\xeb\xa0\x8c\x01=+\xba\ry\x18t\x03\xbf\xe4]\"\xa2\xb8\xdc\xb5\xffg\x9et\x81V\xc5{2e%os\x97\xf6\xc1\x8c\x91\"\xdb[\xdf\xb6pv\xee\x1a\x04\xdc\xcf\xd3&\x99\xaa\xd4q\x99\xbd\xe5\x05', 0x0) write(r1, &(0x7f0000000300)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc0045516, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) 13:49:55 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(0xffffffffffffffff, &(0x7f0000000180), 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13:49:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000002c0)={0x7, 0x0, [{0x2, 0x1, 0x0, 0x0, @msi={0x3, 0x8, 0x101}}, {0x0, 0x0, 0x0, 0x0, @adapter={0x49c29812, 0x3, 0x7, 0x2, 0x4}}, {0x9, 0x1, 0x0, 0x0, @msi={0x6, 0x2, 0x100}}, {0xfff, 0x1, 0x0, 0x0, @sint={0x550b, 0x5}}, {0x0, 0x4, 0x0, 0x0, @sint={0x10001, 0x3}}, {0x0, 0x2, 0x0, 0x0, @adapter={0x3, 0x5, 0x7, 0x6}}, {0x80, 0x1, 0x0, 0x0, @irqchip={0x6, 0x7}}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:49:56 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020001ff000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) umount2(&(0x7f00000013c0)='./file1\x00', 0x1) r1 = syz_open_dev$audion(&(0x7f0000001140)='/dev/audio#\x00', 0x8, 0x200000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000011c0)='IPVS\x00') openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x10800, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000001340)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x10000200}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xf4, r2, 0xffbed2024f071f45, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x59d834e1fca1333a, 0x8}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hwsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8080}, 0x40881) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="4bebe3601605000000000000005098", 0xf}], 0x10000000000002ed, 0x0, 0x0, 0x10}, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000001400)={0x20, 0x0, [], {0x0, @reserved}}) mkdir(&(0x7f0000001100)='./file0\x00', 0x80) 13:49:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1265.698760][T21955] IPVS: ftp: loaded support on port[0] = 21 13:49:56 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702009fff000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1265.999965][T21963] IPVS: ftp: loaded support on port[0] = 21 13:49:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r1 = accept(0xffffffffffffffff, 0x0, 0x0) write$UHID_DESTROY(r1, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r1, 0x80000) 13:49:56 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400000) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000100)={0x7, 0x7, 0x1ff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000980)={0x0, 0x989680}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r2) openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) readv(r2, &(0x7f00000002c0), 0x17a) 13:49:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:56 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) r2 = gettid() prlimit64(r2, 0x6, &(0x7f0000000040)={0x0, 0xdc}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x480000, 0x0) write$FUSE_INIT(r3, &(0x7f0000000200)={0x50, 0x0, 0x7, {0x7, 0x1f, 0x3, 0x200000, 0x7, 0x7, 0x7b, 0x3}}, 0x50) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "a604889f780227eb", "16412cfe80b11ee3ee44d45ace4ed949", "e01faaa5", "f187a51e0c4627c8"}, 0x28) setreuid(r0, 0x0) execve(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 13:49:56 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000500bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:56 executing program 5: r0 = socket(0xa, 0xa, 0x40) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x9, 0x1, 0x4, 0x1000, 0x4, 0x4, 0xfffffffffffffff9, 0x0, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x3, 0x1f, 0x200, 0xdf, 0x6d7d1cb5, 0x80, 0x1e2, 0x9, r1}, 0x20) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r2, 0x0, 0x0) 13:49:56 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000600bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:56 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x4) r0 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000380)=""/135) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x400, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x100) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x5, 0x1) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, 0x0) getresgid(0x0, 0x0, 0x0) r3 = getgid() setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x3c, 0x3) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75747065516469723d2e2f66696c65302c6c6f777e726469723d2e2f66696c65302c776f726b646972b5c03c3d2e2f66696c65"]) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000080)) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000340)={0x401, 0x2, 0x350}) mkdir(&(0x7f0000000040)='./file1\x00', 0x10) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='aufs\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x4, 0xb, &(0x7f0000000280)=""/145) eventfd(0x80000001) 13:49:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$kcm(0x29, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140)={r2, r3/1000+30000}, 0xeb) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000080)='vmnet0lo:eth0bdev\x00', 0x12) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x1010, r0, 0x100000000) close(r4) write$binfmt_aout(r5, &(0x7f00000001c0)={{0x107, 0x91c, 0xffffffff, 0x345, 0x75, 0x2, 0xad, 0x9}, "", [[], [], [], []]}, 0x420) close(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0xc0, 0x0) ioctl$MON_IOCX_MFETCH(r6, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x9}) 13:49:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0xfffffffffffffffd) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x401, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0xffffff92, 0x0, 0xffffffe0, 0x0, @tick, {}, {}, @quote}], 0xff33) write$rfkill(r2, &(0x7f0000000240)={0x8, 0x8, 0x3, 0x0, 0x1}, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r2, 0x0, 0x6, &(0x7f0000000000)='em0,:\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r2, &(0x7f00000000c0)=r3, 0x12) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000180)=0x6, &(0x7f00000001c0)=0x1) 13:49:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:56 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000800bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1266.528290][T22011] overlayfs: unrecognized mount option "utpeQdir=./file0" or missing value [ 1266.630906][T22002] IPVS: ftp: loaded support on port[0] = 21 [ 1266.713682][T22023] overlayfs: unrecognized mount option "utpeQdir=./file0" or missing value [ 1267.199981][T22005] IPVS: ftp: loaded support on port[0] = 21 13:49:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x4) write$UHID_DESTROY(r2, 0x0, 0x0) sendmsg$can_raw(r2, &(0x7f0000000340)={&(0x7f0000000080), 0x10, &(0x7f0000000300)={&(0x7f0000000280)=@canfd={{0x1, 0xdf3, 0x991e, 0x6}, 0x1d, 0xe3a842b584195ccd, 0x0, 0x0, "5f7d801f644adf92f1acdc716170b155a29e3994c17fea2a64b97873c93ea14557d7fa80b2046a910a8e4eb53ba04ce965d1d5b28665492ccc30b15abd2a9f45"}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:49:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:57 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xe172, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='vmnet0lo:security#&\x00') r1 = dup(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x6, @empty, 0x4}}, [0x0, 0x2, 0x80, 0x2, 0xfc7d, 0xff, 0xfffffffffffffff8, 0x5, 0x58c3, 0x3f, 0xfffffffffffffffb, 0x0, 0x7fff, 0x9, 0xf0c]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x1, 0x1, [0x3]}, &(0x7f00000002c0)=0xa) 13:49:57 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000900bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x0, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1267.382972][T22042] NFS: bad mount option value specified: vmnet0lo:security#& 13:49:57 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000a00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x0, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1267.596556][T22042] NFS: bad mount option value specified: vmnet0lo:security#& [ 1267.616365][T22056] IPVS: ftp: loaded support on port[0] = 21 13:49:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x50100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r1, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2, 0x0) write$P9_RLOCK(r1, &(0x7f0000000000)={0x8, 0x35, 0x2}, 0x8) write$P9_RLOCK(r1, 0x0, 0x9c65a33427710583) 13:49:58 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000b00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1267.941886][T22050] IPVS: ftp: loaded support on port[0] = 21 13:49:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x81, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000004c0)={0xa37a4b6c75d4d3a2}) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000540)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) recvfrom$x25(r2, &(0x7f0000000080)=""/223, 0xdf, 0x40, 0x0, 0x0) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000500)=0xe8) sendmsg$can_raw(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x1d, r4}, 0x10, &(0x7f0000000400)={&(0x7f00000003c0)=@can={{0x3, 0x5, 0xfffffffffffffffe, 0xfffffffffffffff7}, 0x1, 0x3, 0x0, 0x0, "98db60f34b57b5da"}, 0x10}}, 0x10) dup3(r0, r2, 0x80000) 13:49:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x0, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:58 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000d00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:58 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000e00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x0, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1268.405020][T22099] IPVS: ftp: loaded support on port[0] = 21 13:49:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000680)) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) socket$rxrpc(0x21, 0x2, 0xa) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 13:49:58 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x50001, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x5, 0x200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='new default'], 0x1, 0xfffffffffffffffd) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000100)=0xffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1268.742662][T22101] IPVS: ftp: loaded support on port[0] = 21 [ 1268.829718][T22116] encrypted_key: insufficient parameters specified [ 1268.873718][T22119] encrypted_key: insufficient parameters specified 13:49:59 executing program 5: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000180)={0x0}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4a, 0x101000) accept$inet(r1, 0x0, &(0x7f0000000140)) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000080)={0x10, 0x7fffffff}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$MON_IOCX_GETX(r0, 0x80089203, &(0x7f0000000100)={0x0, 0x0}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 13:49:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x0, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:59 executing program 4: r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000980)="6eec39c24c7a", 0x6, 0x0, &(0x7f0000000440)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0xe7e, 0x4, 0x15a3c5f33fc9bd58, 0xff, 0x81, 0x7, 0x0, 0xfffffffffffffffb, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000000c0)={r3, 0x36000000000, 0x4}, 0x8) r4 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r4, 0xc058534f, &(0x7f0000000180)={{0x101, 0x9}, 0x1, 0x3, 0x4, {}, 0x2, 0x8}) 13:49:59 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000004000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000280)='$]\x00', 0x3) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f00000002c0)=0x4) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x80000) 13:49:59 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x3ff, 0x7, 0x9, 0xfb1, 0x19, 0x20, 0x7, 0x20, 0x80000001, 0x7ff, 0x6, 0x4}) 13:49:59 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x20) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x7, 0x9, 0x200}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TCSETXF(r2, 0x5434, &(0x7f00000000c0)={0x2, 0xb3b5, [0xa2, 0x3, 0x40, 0x80000001, 0x7], 0x100000000}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000100)={0x9, 0x1, 0x7fff, 0x4, 0x9, 0x2}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0xa0000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e23, 0x3, @loopback, 0x9}, {0xa, 0x4e22, 0x5, @mcast2, 0x80}, 0x6, [0x9, 0x3, 0x40, 0xd3, 0x7fff, 0x0, 0x9, 0x3]}, 0x5c) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000200)={0x0, 0x3}) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x27}, 0x7}, 0x1c) recvmmsg(r3, &(0x7f0000003800)=[{{&(0x7f00000002c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)=""/195, 0xc3}], 0x1, &(0x7f0000000480)=""/191, 0xbf}, 0x835}, {{&(0x7f0000000540)=@ax25={{0x3, @bcast}, [@netrom, @default, @bcast, @rose, @default, @remote, @netrom, @null]}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/151, 0x97}, {&(0x7f0000000680)=""/57, 0x39}], 0x2, &(0x7f0000000700)=""/114, 0x72}, 0x3ff}, {{&(0x7f0000000780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000800)=""/249, 0xf9}, {&(0x7f0000000900)=""/50, 0x32}, {&(0x7f0000000940)=""/180, 0xb4}], 0x3}, 0x9}, {{&(0x7f0000000a40)=@nl, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/46, 0x2e}, {&(0x7f0000000b00)=""/114, 0x72}], 0x2, &(0x7f0000000bc0)=""/161, 0xa1}, 0x6}, {{&(0x7f0000000c80)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000d00)=""/223, 0xdf}, {&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/72, 0x48}, {&(0x7f0000001e80)=""/19, 0x13}], 0x4, &(0x7f0000001f00)=""/230, 0xe6}, 0x80000001}, {{&(0x7f0000002000)=@ipx, 0x80, &(0x7f0000002180)=[{&(0x7f0000002080)=""/255, 0xff}], 0x1}, 0x40}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f00000021c0)=""/61, 0x3d}, {&(0x7f0000002200)=""/85, 0x55}, {&(0x7f0000002280)=""/240, 0xf0}, {&(0x7f0000002380)=""/138, 0x8a}, {&(0x7f0000002440)=""/26, 0x1a}, {&(0x7f0000002480)=""/201, 0xc9}, {&(0x7f0000002580)=""/237, 0xed}, {&(0x7f0000002680)=""/86, 0x56}, {&(0x7f0000002700)=""/38, 0x26}], 0x9, &(0x7f0000002800)=""/4096, 0x1000}, 0x3}], 0x7, 0x60, &(0x7f00000039c0)) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000003a00)={0x29, 0x6, 0x0, {0x6, 0x3}}, 0x29) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003a80)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000003b80)={&(0x7f0000003a40)={0x10, 0x0, 0x0, 0x10020}, 0xc, &(0x7f0000003b40)={&(0x7f0000003ac0)={0x48, r5, 0x300, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000050}, 0x800) timer_create(0x5, &(0x7f0000003bc0)={0x0, 0x16, 0x2}, &(0x7f0000003c00)=0x0) timer_delete(r6) getsockopt$nfc_llcp(r1, 0x118, 0x2, &(0x7f0000003c40)=""/206, 0xce) r7 = semget(0x3, 0x2, 0x80) semctl$GETNCNT(r7, 0x0, 0xe, &(0x7f0000003d40)=""/4096) setsockopt$inet_udp_int(r4, 0x11, 0x66, &(0x7f0000004d40)=0x71, 0x4) sendmsg$alg(r3, &(0x7f0000006200)={0x0, 0x0, &(0x7f0000004fc0)=[{&(0x7f0000004d80)="12cb7d175cc65663a840bc3d3e17c6d58aa6ece55ecd9fc2ec1bb000fa1719c0a63bd9fb3263a2402f105c3f8d956bc62e13d9aaf3cb39ccc05d276fa0d0a017a9844bdfecaf2d10032273650a35d26de08ca15a25c615b2ae51b3b31993025aac8c6659ee7f0d5ee557e638af9cc6c9647f78bcb60e7fede369764c644ea71558f84a75b65a060cd0f7d8b44fabf517ef504cdd58c7c665c3edc3e16dfacd11f1b5a84f2a4f97b98666", 0xaa}, {&(0x7f0000004e40)="5e8b1b798077f3cacb3747f6cae00ccab0bbe135a6f975cf3d9787754d5649c3c26feb97bdf72f429dec84bf9e923872ab4e2e25f21d4ffa5da92016ea050de81e739aa701566c53c66a8507516f953b40610f16086db4661cdb94760c61350f9e8d1eebbac4c8a18f94f918113b3528e2bc2b33fdba03d47cfb97bf5ed5d56c9b38f91851597da7a8dc95050ed6d858beb6b351102691618cb1b42197ee038b18211e3310e8ee6973cb2ccdf9295ce4d887906dbb5ab69894486a89b2426e73a4a7ef74c45d303d816ca2353be95d5ffd747314c03668037c807ab38ee9", 0xde}, {&(0x7f0000004f40)="51a70752fc7e27190233bc3262ffbfa18b8e8ce4091d52f4ad5005bbd6438f59ca1de96bb50755396853abf0a93987ff86621b77454c45f0c58545ccffd2ced4f19941ae5f2f51a14d5bbab689f9c45cf0d36b248f55994e2ef91ae111e77fb9618f17e74a52b6be9bc7e145ef9249432ce50691f916", 0x76}], 0x3, &(0x7f0000005000)=[@op={0x18}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0xb0, 0x117, 0x2, 0x9b, "19ecbaf04d618a53c190dfa25cab7380812a027808c1492fd9ce62e080a23007f06fd72957fdec1050f4f9ca13944be6ce75da0eb3988e9b5096ceb9b8e78e64c175be2ae084839c1caa9e54bbd6f414bfc52fbcaa11b85ae025cfbaf4d8b25b4bd8756227e54c2c84f1602f21abbfaac683f485fe734ca7b2a435bd47c5b0625441319c1becb939d433dfcf514d5853590a2639a5077cf9b19e72"}, @iv={0xa8, 0x117, 0x2, 0x94, "6dfaf8f15bdb501bca67088914b2986bcde5f586f9424b9058ee94dd9d161d33a2b749425ff646bd4e6005dc7bfc40bbe50b2cbd0964cad14e2b20850da2dff143540dd3df44a5224412e0f252378d5cfb3ae6d091d1cfc294fa5c79a79bb1e79b6f9e588932bb63e5c68e2301abbe96ca815a04b34582248f4f7630d1d87a1da7f6800adf75253705efda29bfffbb32637ef68e"}, @assoc={0x18, 0x117, 0x4, 0x4}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}], 0x11d0, 0x4000084}, 0x40) ioctl$TCSETA(r2, 0x5406, &(0x7f0000006240)={0x5, 0x9, 0x400, 0x200, 0x9, 0x7, 0x9, 0x1, 0x3, 0x57}) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000006280)) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000062c0)) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000006300)=0x2) r8 = syz_open_dev$sndpcmc(&(0x7f0000006340)='/dev/snd/pcmC#D#c\x00', 0x2000000000000000, 0x1) write$P9_RREMOVE(r8, &(0x7f0000006380)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f00000063c0)={0x75f, 0x1, 'client0\x00', 0xffffffff80000004, "5774e3b13dec7d19", "45d4cbbadf21d0cf7b935f0a5d01670e25951043b9eaece38bd42bf4f9660bf3", 0x704e1a12, 0x80}) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = gettid() getpgrp(r9) 13:49:59 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000f424000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x0, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:49:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="f1c97f126400100000f2408170a044e927d32106b40c627e747cf07183433a9bc4a0052e22234d228521be11ad47f8679310aed61d827d9176a371ff35af626031471f92b24dea35e995d7ebbe93bf4ccb1f9aeef1e42b0c218d5e99c50725abc2b3651012b60919e8a785fa0375ef1b269081b82f50963d569185a0d300e8774e3a4359a934617fc33478042731f0a51302a762285b8c503bb8af6a361c9ab51e41f22e0cab032959dc6754c98fd084034994e33156e5d6ced0b7b4afc73abd65847e0d9a39f5c273b06d280a3150e3", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000f00000000014100000018001700000000000000006574683a0a7863616e310000"], 0x34}}, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 13:49:59 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000034600bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1269.442073][T22132] IPVS: ftp: loaded support on port[0] = 21 13:50:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x54f, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) get_robust_list(r2, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000040)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) 13:50:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x0, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:00 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000000c000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:00 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffe000/0x2000)=nil) shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000080)) socket$vsock_dgram(0x28, 0x2, 0x0) 13:50:00 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000001ff00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:00 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000095b80100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) bind$can_raw(r1, &(0x7f0000000080), 0x384) setsockopt(r1, 0x65, 0x10000000002, &(0x7f0000000000)="e1affde3", 0x4) 13:50:02 executing program 1: r0 = open(&(0x7f0000000780)='./file1\x00', 0xc0, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000800)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, @in6={0xa, 0x4e21, 0x3, @loopback, 0x6}, @in6={0xa, 0x4e22, 0x1, @remote, 0x3}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x4688d33c}, @in6={0xa, 0x4e23, 0x0, @local, 0x8}], 0x80) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f00000007c0)) creat(0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x141044, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r4 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000080)='./file0\x00', r4, &(0x7f00000000c0)='./file1\x00', 0x5) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000100)={{0x0, 0x2}, {0x5, 0x8}, 0x73, 0x2, 0x673c}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x2000002) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000200)={{0x1, 0x5, 0x100, 0x7bc, 'syz1\x00', 0xb37e}, 0x1, [0x6, 0xfff, 0x1, 0x4, 0x100000000, 0x3ff, 0xfffffffffffffffa, 0x1000, 0x7, 0x8, 0x7, 0x9, 0x3, 0xfffffffffffffffa, 0x800, 0xcb, 0x5, 0x101, 0x3, 0x4, 0x1, 0x80000000, 0x81, 0x0, 0xbaa3, 0x2, 0x1ff, 0x1ff, 0x8000, 0x0, 0x5, 0xa3, 0x9, 0x7, 0xfffffffffffffffb, 0x1, 0x5, 0x3, 0x9e10, 0x0, 0x3, 0x5, 0x4, 0x6, 0x0, 0x4670, 0x1c, 0x7f0000, 0xf0a4, 0x5, 0x6, 0x6, 0xd28, 0x6c, 0x0, 0x8001, 0xff, 0x8, 0x7c8, 0xffffffff, 0xd59, 0x80000000, 0x0, 0xff, 0x4, 0x8, 0xd9, 0x6, 0xee64, 0x4, 0x9, 0xbd8b, 0x1, 0x8, 0x6, 0x2, 0x0, 0x8, 0x0, 0x7fff, 0x1ffc000, 0x8, 0xfffffffffffffff8, 0x1, 0x9ce, 0x73c, 0x1ff, 0x2, 0x80, 0x7, 0x400, 0xcb, 0x100000001, 0x80000000, 0x2, 0xcadf, 0x5, 0x3, 0x5, 0x8008, 0x8, 0x7fffffff, 0x1, 0x200, 0x6, 0x96, 0x4, 0x6e, 0x74, 0xaa, 0xffff, 0x7c5, 0x10001, 0x5, 0xfb, 0x7f, 0x7b, 0x3, 0x5, 0x0, 0x7fff, 0x8, 0x7, 0x0, 0x81, 0x4, 0x8000, 0x3], {0x77359400}}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000001c0)={0x0, r5, 0x0, 0x2, 0x0, 0x100000}) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000700)=0x4) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000740)=0x9) 13:50:02 executing program 5: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file1\x00', 0x0) statx(r0, &(0x7f0000000080)='./file1\x00', 0x1000, 0xfff, &(0x7f0000000600)) 13:50:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite\x00') r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) sync() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x5, 0x3, 0x3, 0x0, 0x1, 0x809, 0x8, 0x7, 0xb26, 0x81, 0x2, 0x8001, 0x5, 0x7, 0x8, 0xce03, 0x4, 0x5, 0x9, 0x8, 0x3, 0x4, 0xaf1, 0x401000, 0x100, 0x6, 0x2, 0x8e, 0x800, 0xf2, 0x5082, 0xfc, 0x8, 0xfffffffffffffffc, 0x3, 0x0, 0xfffffffffffffffe, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x221, 0x6, 0xff, 0x5, 0x0, 0x3f, 0x5}, 0x0, 0xffffffffffffffff, r2, 0xa) r3 = socket(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats\x00') sendfile(r3, r4, 0x0, 0x1000000000e2) 13:50:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x0, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, 0xffffffffffffffff, 0x80000) 13:50:02 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) fsetxattr$security_ima(r1, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "a53ffc7e803b1b975e45939eb7307f5b"}, 0x11, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000280)={&(0x7f0000000240)=[0x4, 0x40, 0x6f, 0x3ff, 0xffffffffffffff44, 0x1, 0xe9a857f60000000], 0x7, 0x10000, 0x40, 0x8001, 0x8, 0x4, {0x1, 0x5, 0xa27, 0x1, 0xfff, 0x3dc, 0x1, 0x6, 0x4, 0x8, 0x1ff, 0x2, 0x925e, 0x200, "fc2c3e4d553b8be1b0fffff739ae1f8857b19b106530361ee34f8d421a364db9"}}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xff, 0x0) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000080)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') preadv(r4, &(0x7f0000000480), 0x0, 0x5) [ 1272.401858][T22204] IPVS: ftp: loaded support on port[0] = 21 13:50:02 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1272.444346][ T26] audit: type=1804 audit(1567173002.794:12797): pid=22205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir266459818/syzkaller.CAQkAT/381/file0" dev="sda1" ino=16598 res=1 13:50:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x198, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'vmac(cast6)\x00'}}) 13:50:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x0, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1272.612865][ T26] audit: type=1804 audit(1567173002.944:12798): pid=22201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir266459818/syzkaller.CAQkAT/381/file0" dev="sda1" ino=16598 res=1 13:50:03 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000e00300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1272.742796][ T26] audit: type=1800 audit(1567173003.004:12799): pid=22209 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file0" dev="sda1" ino=16598 res=0 13:50:03 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000580)="906ed590bb9ff528c025bb49d470bb4c5c2914d92b1185fb7f333a64ed5f1f5ffb", 0x0, 0x0, 0x0, 0x0, 0x0}) 13:50:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000680)=""/4096, 0x1000}], 0x1}, 0x40042) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2a80, 0x0, 0x0, 0x800e00506) shutdown(r1, 0x0) msgget(0x0, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) [ 1272.829154][T22207] IPVS: ftp: loaded support on port[0] = 21 [ 1272.891688][ C1] sd 0:0:1:0: [sg0] tag#2332 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1272.901180][ C1] sd 0:0:1:0: [sg0] tag#2332 CDB: Pre-fetch(16) [ 1272.907487][ C1] sd 0:0:1:0: [sg0] tag#2332 CDB[00]: 90 6e d5 90 bb 9f f5 28 c0 25 bb 49 d4 70 bb 4c [ 1272.914183][T22221] could not allocate digest TFM handle vmac(cast6) [ 1272.917092][ C1] sd 0:0:1:0: [sg0] tag#2332 CDB[10]: 5c 29 14 d9 2b 11 85 fb 7f 33 3a 64 ed 5f 1f 5f [ 1272.917108][ C1] sd 0:0:1:0: [sg0] tag#2332 CDB[20]: fb 13:50:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) 13:50:03 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000002000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1272.998619][T22221] could not allocate digest TFM handle vmac(cast6) [ 1273.083990][T22246] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 1273.093540][T22246] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 1273.209323][T22246] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 1273.231177][T22246] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 13:50:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) 13:50:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, 0x0) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:04 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000300)={0x7b, 0x5, [0x40000084, 0x0, 0x400000b3], [0x8b]}) 13:50:04 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000008000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) 13:50:04 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000a000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, 0x0) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x0, 0x4}, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x5f, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 13:50:04 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:04 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000c000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1274.681811][T22265] IPVS: ftp: loaded support on port[0] = 21 [ 1275.075902][T22297] IPVS: ftp: loaded support on port[0] = 21 13:50:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x3, 0xa4, 0x80000000, 0x3, 0x0, 0xffffffffffffff86, 0x80, 0x2, 0x6, 0x80, 0x7, 0x1ff, 0x6, 0x1, 0x1000, 0x87, 0x20, 0x93, 0xc0000000000000, 0x40000000000000, 0x1f8, 0x80, 0xfffffffffffff24f, 0xfffffffffffff800, 0x8, 0x2, 0x7, 0xfffffffffffffffc, 0x6, 0x5, 0x80, 0x7fff, 0x4, 0xf0ec, 0x1ff, 0x7, 0x0, 0x10000, 0x5, @perf_config_ext={0xf63}, 0x0, 0x418d, 0x8000, 0x8, 0x8, 0x1, 0x6c9}, r3, 0x2, r0, 0x2) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x198, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0x56, &(0x7f0000000040)={&(0x7f0000000580)={'sha3-256\x00'}}) 13:50:06 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000d000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, 0x0) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:06 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:06 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000e000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000500)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x7fffffff}]}}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000d00)={"eaa545e7421d85382ba46bd65966a55a8a83886fd638fa602d6b7da40f67b2f7b19acfe93c195f18e5175624f1a0f90796139e7370eeca0d20e37445ca083f14d999650edb9097a2424eb05758d0290ff56fb045e448bf92657a2c3312d7778b32571bd14fb8caad0dc70d4e243038e3f69eeaf8dc766d250c4bfa8afc182d75896e0d7e694cbce34d82d8c930e299ae5f52e3647fad40732f0bb0be973e07b75ec8b1c8753e40609f918c0b892a7ec015541ad2b39be8d258973e3b73d3617c8aec4a7987b165ab75f02e75cfe79ca665ade11ed94100f9de9d81db8612a033f60b236f48e0f3004c996d64afcca027289ef7c38efa2a8bc259eda9e45161b1fbb1dc0dda4a1c3166c2a782f59f7ee8bd9d551e509f3c72687a8944ee55ad69c3c2fed0c2116d56ca160697c6369feda6e5865cc0b1d4bfe6d2681ca34903d6c57f399fb2c85a8e25fb49c4c13bac6a7812e864f919a4358ae8ead402d6c81b955f0a4189b654d66186c36ac9ae5ca312d772942cfcfbdcf01ee1ae94f43ca82e6893aed89d05f386fb65827e27613f8b80ecfaf7d54cbb993d092428773fe107cdd31b05578bf47c78c9af37380bc512cc46d8c1bcc81f8993009b203a0be56e2eb4434a6db1229ed3a6e0476f9a38a6120b95d685851c5549716044f3554bb0e200aecfeefc0e83ce237b5cc3f3b27045faaeb2b6f7e190143240f6baa10f3d41bff09cb3d39627e1594309d60c23dd98a696d038d74317d7268c98a8c9e8822f67870598d3ca09d385ec186ef848af49d312f9bc1448616092181f0f039c30da45266aeff06248d994a228db7ecd834189357a12fcb112ebebecf3ad2b960fbef92b827e51cfd9f5bf443ba730529f1ecee07984168142de2bd3d17ca50d3de1c1aeae8c15e0f44742d34f8dfcd2bbccdc039da3aa25d6fb402f8abe3b3ad9f18ec78a8f788f0a499461f451873551b813b864c5eaf16ea9abdc87aec43d1d2e9e96918b69d5e796e124cc581d0183582790bab792be6e985da3f975e523a7b49175e29268d39e2d12a142dda1b59e9347805b10612b19348cbab9647b517a210d70ecf31696731c20bb6b757bb6645814728b85852c2e661ccd166b52971027122e4736e44d34454df573354f2f96644e41c80692b2688bae0bffb8a2ef53d2b91bf2ecbc60e1cec442e5bf372c3b289ed320947bb3bc368278f48a8c797e604e647f97446374b96ee18b7195e83464dc4acabef1b949623aad99e811f3159dee90f1e6dbe1974876f10971694bf3c33e8260824bfbb35d63e51d5364c151f46c8fccf832d02120bf026b3729b44cc25688e12fc40277f51d9737bc6c1c945bf99d6fb89b4b773213758ae352d6158fc2ca928c6859f4c945761908004c6a1707002dbfab19b9d31adcca5ab570a393ae894a2f4e0110a7513a1982bfa9"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:50:06 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1276.069489][T22314] IPVS: ftp: loaded support on port[0] = 21 13:50:06 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000010000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1276.382624][T22317] IPVS: ftp: loaded support on port[0] = 21 13:50:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000002c0)={r3, 0x51, 0x78}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'crc32c-intel\x00'}}, &(0x7f0000000380)="b8a034b39a4869e04ed164469e5e837c13de99a6ec378058143c5466f66451a4b942080e38f5a843aebab4f74d4a8bba87c36f480a6b2066b252598b64af580c00961de4d163d62f61d911ee48930dc5d8", &(0x7f0000000400)=""/120) socket$rds(0x15, 0x5, 0x0) 13:50:06 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000030000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:06 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0xfffffffffffffdc5) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x6c, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d96d00bba6bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a089d13dc04060040d0c933e2abc93018b2c0ba890955da2af6370042e"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 13:50:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:07 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000050000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:07 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:07 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000060000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1276.785673][T22342] debugfs: File '22341' in directory 'proc' already present! [ 1276.819308][T22351] IPVS: ftp: loaded support on port[0] = 21 [ 1276.860943][T22342] binder: 22341:22342 unknown command -1157599783 13:50:07 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1276.954868][T22342] binder: 22341:22342 ioctl c0306201 20012000 returned -22 13:50:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:07 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200006f000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1277.096167][T22342] debugfs: File '22341' in directory 'proc' already present! [ 1277.129075][T22342] debugfs: File '22341' in directory 'proc' already present! [ 1277.186129][T22370] binder: 22341:22370 unknown command -1157599783 [ 1277.192632][T22370] binder: 22341:22370 ioctl c0306201 20012000 returned -22 [ 1277.230024][T22342] binder: BINDER_SET_CONTEXT_MGR already set [ 1277.242008][T22342] binder: 22341:22342 ioctl 40046207 0 returned -16 [ 1277.276958][T22342] binder: 22341:22342 ioctl c018620c 20000180 returned -1 [ 1277.282617][T22357] IPVS: ftp: loaded support on port[0] = 21 13:50:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, r3, 0x20, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xffffffff}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRET={0xc, 0x4, [0xffffffffffffffff, 0x6]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="16eef9ea209ed838d11efa5b958d9baf"}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040010) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:07 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:07 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000070000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, 0x0, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:07 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0xfffffffffffffdc5) r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x6c, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0563044000000000d96d00bba6bf57f6170084dc808689e2dc22f919af6fd11c368b2a465d37bcd33966a39f4c727567d904a689e65a6bdda7d73cd5416ff3344f91bbf22392b5420ede46e9463927a089d13dc04060040d0c933e2abc93018b2c0ba890955da2af6370042e"], 0x0, 0x0, 0x0}) dup3(r2, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000180)={0x0, 0x100000000000000}) 13:50:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:07 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:08 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000a0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, 0x0, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1277.664351][T22393] IPVS: ftp: loaded support on port[0] = 21 13:50:08 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000c0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1277.876015][T22394] debugfs: File '22379' in directory 'proc' already present! [ 1278.034251][T22394] binder: 22379:22394 unknown command -1157599783 [ 1278.051624][T22394] binder: 22379:22394 ioctl c0306201 20012000 returned -22 [ 1278.094535][T22401] IPVS: ftp: loaded support on port[0] = 21 13:50:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000008c0)={@dev={0xfe, 0x80, [], 0x2a}, 0x4a, r2}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r3, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r3, 0x0) accept(r3, &(0x7f0000000440)=@ipx, &(0x7f0000000080)=0x80) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r4 = dup3(r0, r0, 0x80000) getsockopt$sock_buf(r3, 0x1, 0x1f, &(0x7f00000004c0)=""/216, &(0x7f00000005c0)=0xd8) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000380)={r3, r3, 0x1, 0xcc, &(0x7f0000000280)="d9ec144b254ef2a7e782712c8ac957ec9d4de754ef8131e8328555d3a0929bb7672e0ce239bf33d4b52fd82f4abe44cd7cbced65a9c668d63a84915edb0ac7f2e29a0271cfd8815ec629099fcf815889d2f3a8cb19cd8360f83d58fb8f7ecac5cf9be2f3509d3c1e80287eef2c2965478621fbeea3f1921373c0d6b06a86650e6a5659d3586ede239f11131b841a48995553537a150622b1370d7186427c98cb97261deb9503e85780e9dfc5080a34e4efe2510b7a2ddb8121db1298b1b3465c6ce04ca53b08b34b053a7af0", 0x2, 0x9, 0x4, 0x9b, 0x6725, 0x2, 0x7ff, 'syz0\x00'}) r5 = accept(r3, 0x0, 0x0) write$UHID_DESTROY(r5, 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, 0xffff) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000600)) dup3(r0, r5, 0x80000) 13:50:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, 0x0, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:08 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:08 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000d0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000004a005f0214f9f407000904000a00001c4a008100000000000800020000000000", 0x3ac) 13:50:08 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000e0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r2, 0x0, 0x0, 0x240448c1, &(0x7f0000000000)=@abs, 0x6e) dup2(r0, r1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, 0x0) 13:50:08 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1278.424665][T22430] IPVS: ftp: loaded support on port[0] = 21 13:50:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1278.780608][T22448] IPVS: ftp: loaded support on port[0] = 21 13:50:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer\x00', 0x0, 0x0) accept4$inet(r2, &(0x7f0000000540)={0x2, 0x0, @multicast1}, &(0x7f0000000580)=0x10, 0x800) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = request_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='GPLem0systemsystem\x00', 0x0) r4 = add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000740)="bc06a5d4a16ad109440d07a3264efca1c788f6fc844c7c6446c2193680d959aecbdc1adc5361db254a6fa80d15de892353692fb59c6602e23e18c11360b4a0265620604fd301df10c5dc88d85940137d3fb2ef29a1590f78c35ed8b2db717bd6bf19da864aea88abe535d06e592302a6dfb3c65ccba379d120d125e3cc0a733cb4b3a03f8232e9970b7d3a7c3a69041ec6462b34417dbadd8a5104179792fe8e8c50059dd3403eefffa1823815933855b80cb9f07fad29eb637088639521846e6a8a691424a16b1eeda7349dc769ad636574cffb8f34ace4e51e968bcbfb80403c9223738b6bf1c97a2b861acda09259b543dffface1227bf6765524806ba1f5b81fd4ec09ad8252b9f96858e356f6a7628720735801630e623f9d856dec1d9784bbd89438a3cca4e236ef439cc8607baab97f0c6f67d49cfcfbd92f732349e07d26c19d94bf0613f6599cdb5bfa0af47ad03666718538ec814b1e057024d73a9a2a48f212f9d9f9588866e3e6c0605e28ca930861cc0b63bd7de783b4b58fe3f385eecf0f16a8b34b11bde0c5368cf096990c3788c0e905ea14e22b91627fed4e42e25d26219aa1bec934cade0a1aeba3a60410096829c5431f0d6b0ada1fc87208a1d8836a5b306d23507ce8d9eb176fd0d3cadfc25152cbce311c7f1df4f7eb3ecb86ff5587ea36e9d77e8f4ed719a0cb0a3acd6a401f3b5863ab57f6295f1bf8e0820aa09c695e6ad5aace01c1e0397e51ce70a529fdfc8d68e469f9d41687dbe66cedb791ae035b6ee09e7f1bcd80371370d0d245c9e03fbec25939913fb0e3fd8af465cbec1515b353eeced9f7e691ae1159bd6f60accde469ff0fb4c6fb1fa5d7d1428f7cfa89ee45536dc69fc29026cc3e8e5d1fbb72bfe7bd406e2b3a43a7e76a3df256d2658bfd613ed9e24d223a8b3611f9e6cc0d241d95665de211f6e8e03868d0aee273ec3c6ba5dfbea03e6c84b6359a5d00977b103b5ae1d9057e2c4ffa91130efb138d668f0d81ff7c39646c7bfc3b7b0192071c875c159fcb100f56fdc95a5dcf064a6c86833bbb3d17730d03b932123c3b016f118ddc636aa669dd7b0c5a3fc0be91783f904be16bd4e95f2f338b00dae7ce6bcb526f2b6ba3937670dbc417a4302b304d175d3a8a56d776a1999c76cc9ae73adb1fc05860a4aa9fdbc29cbff5665a8c63ec93468390e3a96c17e0c2626b3a33be8fc39216bb7db7bedc0f285a1426c7bff5b6164e1b93fdd83451f1bc970f5c3271044a5a9b245f6f0b334055aab55bb01ebb19e5ba4f164e3ed9ee51ac94fe20aa1f56090fc0ce4a3d25f03f69e880189f5ad7b3475d5a65705552fa01785d6043e07ae8e8307e7d902ff2e6667b62d09cb809a399878d1b06f5d18ce397411b1ff074846a09738324b0878dbe73cc53134cac39d7479816e6ce4472b232dcce05718afd2074992e9d5bf1db7105e07a2b79800a6eb67246a4d19d5ecd299b535e58bee90dad6cca8b63f8232b63b644b76adffc3f6e7338c22e90e5d64dab4d420e487856ddd6cb2984d360a4187688b23861236ade78091ce1d8185811b2828c4cae3f6312ed4909813f2c371509357f70fd106889ed5de8d90cb6c2f890c0930c3ef2348880b46ae2554d2a77aedb4e3f85826d0bf532b4d41380146d0f94415e6cfce344447c1a2aef04040083ccfaa105e7b820198bba9dd1be24d2e790cc6555f7581e2e9df4ed4fdce846ccca26e2a20a0fb46f0ddbafea64a54e39a23ec8f34c4b80f1cb0e5cc83717e0f880f5013d96bff63f857c0a7c94b2dc0832b1f55ea221b87f01e794b0b85eee9d82aec311c86aa52bcfc8fb5b895681413a5b057eff36bdb10459b2cdb1eb33b9a8d45dd4f74d7a29690506658b2a48ea125a5736ef0c956b3c931ffd963042d32f88fe4c60eb63e08ffd3bc00e611429046516a3078c485984645ba196a9d05142ce6db88329c34221d5095c26fba3e15ba4abdba0a4dffac821007d3ce2f246a71ecd9794c9aa2a1a51e0afef356453cd9ca6a0292d0de7b7cf74c979daa0d0fc2788e1fcdf8db15b5ddc8c5a3e38be12908cb8c16470dff59be3f7e5e4eb91dd47e2b4718a56f762eee6a9e6eb45783ece713c3e2f6e247b401c05951a01fe575e58aead9c61cf2fa4fcae75cc1600a3a04c0b4c578d407daa6c4ae67c32f4a78d89a9a5ff7c1def563a8eb131bc4fe06228acfaf9e822bcfebbe1c204b851def365a91886c4d9b8f92b3eb0482d4fd89948e23f01c1fd4d198d9423fef79cfe5f06900d36a5ab510bd792b0c80d11d8a012fc6dd485917eebef163214418e557ee52011beff8efd5601b96fc04524af9b8c56c531958dcd85ce2d878ab2e898c683a71a0e1718bcf6b1e553898d3f89b56646ed729f75539e24405308abed0606fdc90b07a5170398a78c228b8d235c48d6c8450fcdd6badd9c09c46f476d3e838d9d214b52cdc8cea79abade74ac25e985d4e8f90b0b61454434d45e9920c67e53f3aa4a24a0d950549c1902299640b5ca5491f2e1ddea5a9301b3754fe3fb45a634c46c7019fb1b7c2b6eb864c3c10de28102c42e1912dda61677f8fd8676c30533bbaf69f6fe6be91f87103d5b90a7e6b2f498778fe715c262569040ae45dad6dfa13540467a589621460006294df4bea9b2c6b5a693e6bc8ff09f668fbf9bb2db661200545a7a46786db3567cea5bfde557ce7003e8b023b2a5a379eef80d6f84a33f5afe93d4ea5958d075c442f0fc73b3af7a53abdcf44815965cbcc88802c73150522f738e5f33a26731b0521da9055653602a7b5f3a3d36f2dccff1c9005af10952eeacc339c3046851a312e95e2e4101451aefc84ce47cad251ccaf3811a9e9324255c42f5336939b167bd6d1e7d20b831dc704d1ace77bad325bec897c7331fa33d3bc6e7ee40eb33627387fe6798344b66b5de13620f5a4a420aa3c1540b58bc9108f8868c02bc713c55e70043622ad3e4361b717e39890e95b9e856934e5668a733e4c3372e6c90e44e91e523362f76bef1e7a37c9e79f5aeb6d69d63a82ee3a5fdcd756ec0adef47f1e848acd44f35bc52155c087d2505356f4f04156b1ba828fd13eed4fbd3f3518741f0af85653ca71820680e574f6c732448800aa9595bcc5f836ea51122a7355cdb846f9bb7e2d11a63a59147e4f6872e383dbac356e25e817d18a9fe7b178c6b7e20c58b87961f737af1c04eb650ea6a9691793d58190111a1ada06d09edafd131396e8c3d0877c38183483b1526b76dbb372984c6cf357417da3c5905dd2f6d9491ddd700f55d1ad7d0ac5e885972e501251fb2eb0213355d78cd4084066f2c8f78aa4e17631ed64c2c5aea9bdd38baa9dbab8d87cbad348ab78b81631f4f4b843de8862f345201c7e676ac7e4f8b29f4c5a98fa74972d96e121235033cb6bb9957a028d747f582a3e3ed66be34650af71b035b3d4533283c35e319ba8196dc5501f9aee3ab8f3dbf7645643c81382c5e2192e5c6abb700af42af0e5d78b968e2f233d05fffeeb31b135f4478b267d10fb6ea819c0b3c4b61db12449d60e0e22b1d94893359ca0ea530be4c776a109ada03c305e5852af45dd34990c47b92da66094529b7acc4dd06eac336cac5b637d3f86bbfdf6d7c0623b425b06dc578d417c08d7de5f14b94ae55102f36d4cff96eee82e629efa121539bd414af2c6b5b442f6620f706f1db8241f57b66a0d062ada9163d723cc060cb7f95949c039ba5d926fb63bf633bfb4e592f455588de17e34b7107296c6f19e9b52662e0e0c313285b5ededb0eff50ecd0226c7f4547597ded63f9e4684fed0930e5aad8fb894c0b3b7e2e2f227c4e99bb6f6d27503b7e32e9504f168adf7401f6a5b1f520cfca128158c15b849d9ea32be029040c2f8f05469b61b404fdbb2989d40c33bfa44f19bb8b3ab6595e52a86958384ad2d030e74189b0325c57defd792b913fc9f1518a8a8929428d9e4a5d6b2b98fd37a0db5b71b29e84840b484babfce6deff2291bb429422a1b088e0abb4fc0aa7f5f4b012d284e45f4372c8ac58538c46c33f4e19347a097d49621c1214e98b65999601ecbd6dbf3af917938922affe691572019b1c355446ea0041e314bbabba547056dc03abc233f4d852d58ab2342384f673a8c02371fc878747e99513aebc52c6c438470e4ae0ef435cc9ba10a673ee72d6d2273c7a5c023e9b1a641b818711b63327b6c906f9dc570706243dd28c779bbfbc1a6f8084698ca65a78a32301814ac490bc11ff0bcd5e0bb0b660e466bac8c8e7a66f72a9a987a19f16f0924099ca9b6a1d16c97fea819a878b8313b9e0af2531e1ef6c5bc299165542de671378f64f731c6f50d4f98d4d8d0d7a8811b69f83cd8f42129e7337275baaf0749845d13148a6c4302ddefce9bbbef89a6a88d81fcea75cb73e2a5218f86ba5cbf6565d1a52dd395f8fa73ec0ef5ba5ad07f874fd0b31e7256bffd61d7d4c597ac31f4c46f906db15c1c2f123f509c52970332988176a8090b37e8887a8e5bae909f37d64622ba64c619ea9dae2beaac3db28ad0af39f680650d2cbc59ebf35764743511f80e864afb71c630a1bb0f8b78423b68f59231a886a35d7a660366a925b6b8e7e0b2d2199ecf382765c81db8303c494721fef9aed0e0a1e4adcd322df29ad1445b64a9f54daf89791d185c0c88ecae5d5d6e94b46ecfb391b56f7f8ab63f45fe20f823106f73b369a0dfaf4d387e24208d1cbdecbd5729831796e367e954046a5c968f0f6179b2f60b02fb623343c94eaedd4e07b8a8c30a45314f6426c3ab8c06157588e149509509123fde595e8a8e8a5db067bed2ef29b2c1af4a2e5a7d3d06fbed06ca9774722c97a32377ae6b108898d297cc549a29cd8f1136c1e64e43b5a9b4fdfd4264735dffb7200ac49419798dc352495c3babcefcc4a0f5c712a9ac8605ea3ff676654e84ebd9f8cba45ec3bb63caa99b85e461fd75bb30bf579939304e54d7c4288ad31126a8d1651de373e2e9f1e21743a6c0c703097d5ca88cdba2e397bdc5267e804ed7996ce9c84e66df3c5fb561994b2f5ec0648da44fd0d8b9fef45224302404093c98522ffb41bfc7f02b56f83e29112b01df654d2a7d3c4e2cbea99337e49e7da529c395d092d4c39db999f9e3cce77a0c2f7bdfed8ff07049e60650c27b830d628b0231c60eaa150c4b350adac5e926f8b105d8b381b04142cdb757b7b80a8a6a30559852aa15fb1d06edfe19ea2ccb9eecb7c4b17faaf4dbe565ac2335e5ad08b7ef4f684b3e3b6538d0a273e3fa085c668560a639474d23bc5ccd384aa18947a5107d16f35ccaf85caa2d685e3a141c881bed8003ef316cbfe6d8adc5450e400cbe6347d90fe139599cb05c93093ebfc748194b64063e57a00bdcb4f1d2bb6330bbf83d57c6c2334894ea71706a73a64c1d91fbc05cfd2a27d18ba24b062eda48b6c90d45630a528597bfaea6276aa2525f0b07dbf481e18efa8f1f93e12ed3321bbe945c7c25ecfd9f5b77d5b1c0aba7c4a4da2c078eb8db59237300e53386950c1a2d4aee8524a8a5c9f277db029818ca582fe706cd256bbef8648b958874313f3a09309e6e3df014d0dacf5eedf2538469f2bf40a50a7e70a0e414fd183dd2207113504ce90c948e38b6686735113f8b9adb6e50a3b4467221377d0639d6a5b50fef208707a4e29f3be6fb0c50c3760f9dba2def39c1c2f41e9f84e5dd378436770e18acc1c9391471027b44663511e30cb70d72c4df369bf123aa92b05eba9bdc32b4f1c990a", 0x1000, 0xfffffffffffffff9) keyctl$negate(0xd, r3, 0x2a7, r4) r5 = accept(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x5965f916b81f749e, 0xa}}, 0x20) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000480)={0x12, 0x10, 0xfa00, {&(0x7f0000000380), r6, r7}}, 0x18) ioctl$TIOCLINUX4(r7, 0x541c, &(0x7f00000004c0)) write$UHID_DESTROY(r5, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000005c0)=0x10) sendmsg$can_raw(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r5, 0x80000) 13:50:09 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:09 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000200400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RAUTH(r1, &(0x7f0000000100)={0x14}, 0x14) fallocate(r1, 0x20, 0x0, 0x7ff800000) ioctl$VT_ACTIVATE(r1, 0x5606, 0x200) fallocate(r1, 0x8, 0x0, 0x8000) 13:50:09 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000300400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:09 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xc2f, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000005300)=""/4096}, {&(0x7f0000000040)=""/23}, {&(0x7f0000006300)=""/4096}, {&(0x7f0000000080)=""/41}, {&(0x7f0000007300)=""/231}, {&(0x7f0000007400)=""/165}], 0x2000000000000109, 0x0) 13:50:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:09 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1279.173757][T22479] IPVS: ftp: loaded support on port[0] = 21 [ 1279.567501][T22484] IPVS: ftp: loaded support on port[0] = 21 13:50:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0xfffffffffffffcd8) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x552c, 0x501) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:11 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:11 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockname(r0, &(0x7f0000000140)=@in={0x2, 0x0, @loopback}, &(0x7f0000000280)=0xffffff5c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bind$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x5, 0x8, 0x6129, 0x9, 0x8, 0x80000000}}, 0x8) umount2(&(0x7f0000000540)='./file0\x00', 0x4) quotactl(0x0, &(0x7f0000000480)='./file1\x00', 0x0, 0x0) 13:50:11 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000003f0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(0x0, 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:11 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000400400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(0x0, 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:11 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1281.383579][T22515] IPVS: ftp: loaded support on port[0] = 21 [ 1281.525306][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1281.531179][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:50:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:12 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000500400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1281.685350][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1281.691195][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1281.951498][T22526] IPVS: ftp: loaded support on port[0] = 21 13:50:12 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:12 executing program 5: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) write$rfkill(r0, &(0x7f0000000040), 0x8) 13:50:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(0x0, 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x95a10e54d1688387, 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000280)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000002c0)=""/63) dup3(r0, r3, 0x80000) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000740)=""/4096) 13:50:12 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000600400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:12 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000006f0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000008c0)={@dev={0xfe, 0x80, [], 0x2a}, 0x4a, r2}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r3, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r3, 0x0) accept(r3, &(0x7f0000000440)=@ipx, &(0x7f0000000080)=0x80) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r4 = dup3(r0, r0, 0x80000) getsockopt$sock_buf(r3, 0x1, 0x1f, &(0x7f00000004c0)=""/216, &(0x7f00000005c0)=0xd8) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000380)={r3, r3, 0x1, 0xcc, &(0x7f0000000280)="d9ec144b254ef2a7e782712c8ac957ec9d4de754ef8131e8328555d3a0929bb7672e0ce239bf33d4b52fd82f4abe44cd7cbced65a9c668d63a84915edb0ac7f2e29a0271cfd8815ec629099fcf815889d2f3a8cb19cd8360f83d58fb8f7ecac5cf9be2f3509d3c1e80287eef2c2965478621fbeea3f1921373c0d6b06a86650e6a5659d3586ede239f11131b841a48995553537a150622b1370d7186427c98cb97261deb9503e85780e9dfc5080a34e4efe2510b7a2ddb8121db1298b1b3465c6ce04ca53b08b34b053a7af0", 0x2, 0x9, 0x4, 0x9b, 0x6725, 0x2, 0x7ff, 'syz0\x00'}) r5 = accept(r3, 0x0, 0x0) write$UHID_DESTROY(r5, 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, 0xffff) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000600)) dup3(r0, r5, 0x80000) [ 1282.191031][T22557] IPVS: ftp: loaded support on port[0] = 21 13:50:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:12 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:12 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000700400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1282.505414][T22569] IPVS: ftp: loaded support on port[0] = 21 [ 1282.528664][T22562] IPVS: ftp: loaded support on port[0] = 21 13:50:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:13 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:13 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000ff9f0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:13 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x200400, 0x0) bind$netlink(r2, &(0x7f0000000580)={0x10, 0x0, 0x25dfdbfc, 0xec38368c3ae10a42}, 0xc) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000005c0), &(0x7f0000000600)=0x8) socket$caif_seqpacket(0x25, 0x5, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) r4 = dup3(r0, r3, 0x80000) recvmsg$kcm(r4, &(0x7f0000000500)={&(0x7f0000000280)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000300)=""/65, 0x41}, {&(0x7f0000000380)=""/152, 0x98}, {&(0x7f0000000440)=""/93, 0x5d}], 0x3, &(0x7f00000004c0)=""/10, 0xa}, 0x40002103) 13:50:13 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:13 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000ff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000008c0)={@dev={0xfe, 0x80, [], 0x2a}, 0x4a, r2}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r3, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r3, 0x0) accept(r3, &(0x7f0000000440)=@ipx, &(0x7f0000000080)=0x80) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r4 = dup3(r0, r0, 0x80000) getsockopt$sock_buf(r3, 0x1, 0x1f, &(0x7f00000004c0)=""/216, &(0x7f00000005c0)=0xd8) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000380)={r3, r3, 0x1, 0xcc, &(0x7f0000000280)="d9ec144b254ef2a7e782712c8ac957ec9d4de754ef8131e8328555d3a0929bb7672e0ce239bf33d4b52fd82f4abe44cd7cbced65a9c668d63a84915edb0ac7f2e29a0271cfd8815ec629099fcf815889d2f3a8cb19cd8360f83d58fb8f7ecac5cf9be2f3509d3c1e80287eef2c2965478621fbeea3f1921373c0d6b06a86650e6a5659d3586ede239f11131b841a48995553537a150622b1370d7186427c98cb97261deb9503e85780e9dfc5080a34e4efe2510b7a2ddb8121db1298b1b3465c6ce04ca53b08b34b053a7af0", 0x2, 0x9, 0x4, 0x9b, 0x6725, 0x2, 0x7ff, 'syz0\x00'}) r5 = accept(r3, 0x0, 0x0) write$UHID_DESTROY(r5, 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, 0xffff) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000600)) dup3(r0, r5, 0x80000) 13:50:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1283.060719][T22603] IPVS: ftp: loaded support on port[0] = 21 13:50:13 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:13 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000001ff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:13 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0x0, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:13 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200009fff0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1283.402009][T22620] IPVS: ftp: loaded support on port[0] = 21 13:50:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1283.552941][T22603] IPVS: ftp: loaded support on port[0] = 21 13:50:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) r2 = getpgid(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000004c0)=r2) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x208002, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r4, 0x770a, 0x0) r5 = dup(r3) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r5, 0x80845663, &(0x7f00000002c0)={0x0, @reserved}) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x80000) ioctl$VIDIOC_S_FBUF(r5, 0x4030560b, &(0x7f0000000480)={0x2, 0x8, &(0x7f00000003c0)="fa9052f74cce7c87f4c0de27a7b91389042a8c8bde1b5d88c9918202a1697a9200dbfd9ea3d150642df77ca258301118885137ab160a522f5d49e56fa607c4843920a1d35679ba01e2d499cb9bf3cc9a898ed2e6fd1007cdb679994ebe41a52ac71a7081529554f8e8ab0bc3bfa904ca12876993d75202c5f671ba614e08aa072a1ca21852fbeec511b579a6ba53", {0x4, 0x40, 0x0, 0x6, 0xb2ad, 0x0, 0x5, 0x1}}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000280)=@req={0x28, &(0x7f0000000080)={'bcsh0\x00', @ifru_flags=0x200}}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video37\x00', 0x2, 0x0) 13:50:14 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0x0, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:14 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000401bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:14 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0x0, {0x8, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1284.053217][T22645] IPVS: ftp: loaded support on port[0] = 21 13:50:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:14 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:14 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000140bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1284.551652][T22651] IPVS: ftp: loaded support on port[0] = 21 13:50:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x0, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:15 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:15 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000240bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:15 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000340bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:15 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x0, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:15 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000180bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:15 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x0, 0x0, 0x0, 0xb2aa}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1285.219772][T22687] IPVS: ftp: loaded support on port[0] = 21 [ 1285.618228][T22721] IPVS: ftp: loaded support on port[0] = 21 13:50:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x80) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) sched_getaffinity(r3, 0x8, &(0x7f0000000340)) dup3(r0, r2, 0x80000) 13:50:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:17 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000280bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:17 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:17 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:17 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000380bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1287.663811][T22738] IPVS: ftp: loaded support on port[0] = 21 13:50:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1287.992495][T22755] IPVS: ftp: loaded support on port[0] = 21 13:50:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x24000050) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:18 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000383bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8}}) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:18 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:18 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000384bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1288.302452][T22775] IPVS: ftp: loaded support on port[0] = 21 13:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:18 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:18 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000385bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1288.632227][T22792] IPVS: ftp: loaded support on port[0] = 21 13:50:19 executing program 2: r0 = gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) poll(&(0x7f0000000080)=[{r2, 0x100}, {r1, 0x40}, {r2, 0x18}], 0x3, 0x8001) writev(r1, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r1, r3, 0x80000) 13:50:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:19 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000391bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5b60a7810e2fb960b6d515982538fe65d97"], 0x2f) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:19 executing program 4: mkdir(0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:19 executing program 4: mkdir(0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:19 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000394bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1289.048369][T22816] IPVS: ftp: loaded support on port[0] = 21 13:50:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(r2, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x43000ec81fa47ea6) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="a3b7dec7ce4210b0f0cd723adfb590906ccd6a714ae397bfbc6fd1a864214b6beb6d24c13e52ad35ce34d39ca08343825df4942cc44dc551d5b74e94ac02845267ec74ed85d6932f6550f7b5db171949580242f05ee6933c3364491c4d62a7b8c6334b48da", 0x65}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1a0, 0x44010}, 0x1) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:19 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000395bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:19 executing program 4: mkdir(0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1289.409346][T22816] IPVS: ftp: loaded support on port[0] = 21 13:50:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:19 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000399bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1289.695062][T22850] IPVS: ftp: loaded support on port[0] = 21 13:50:20 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(0x0, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1289.957199][T22869] IPVS: ftp: loaded support on port[0] = 21 13:50:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) unshare(0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) r3 = dup3(r0, r2, 0x80000) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f0000000080)={0x2000}) 13:50:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:21 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000000039abfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:21 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 13:50:21 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(0x0, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:21 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(0x0, 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:21 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000000029cbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:22 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 1291.669643][T22887] IPVS: ftp: loaded support on port[0] = 21 13:50:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1292.003719][T22906] IPVS: ftp: loaded support on port[0] = 21 13:50:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x400000000002, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000240)={0xf000, 0x10000, 0x6, 0x8001, 0x7f}) dup3(r0, r2, 0x80000) timer_create(0x4, &(0x7f00000002c0)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000280)="afaa4a36d7620e9c38b0b713383c9749bd61309e0dd727a784af6d82fe340294d455db622db29746", &(0x7f0000000740)="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"}}, &(0x7f0000000300)=0x0) timer_delete(r3) 13:50:22 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 13:50:22 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000000029dbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:22 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(0x0, 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:22 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(0x0, 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:22 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000000029fbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1292.384699][T22925] IPVS: ftp: loaded support on port[0] = 21 13:50:22 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000002a0bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1292.759455][T22937] IPVS: ftp: loaded support on port[0] = 21 13:50:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:23 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(0x0, 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x42060800) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x238) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001480)='/dev/ptmx\x00', 0x509000, 0x0) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) r4 = gettid() r5 = getuid() getresgid(&(0x7f0000000980)=0x0, &(0x7f00000009c0), &(0x7f0000000a00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) getresgid(&(0x7f0000000bc0)=0x0, &(0x7f0000000c00), &(0x7f0000000c40)) r10 = gettid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000d80)=0xe8) getgroups(0x3, &(0x7f0000000dc0)=[0xee00, 0xee00, 0xffffffffffffffff]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000e00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000e40)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000f40)=0xe8) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0)=0x0, &(0x7f0000001000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001040)=0x0) getresuid(&(0x7f0000001080)=0x0, &(0x7f00000010c0), &(0x7f0000001100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001140)={0x0, 0x0, 0x0}, &(0x7f0000001180)=0xc) sendmmsg$unix(r2, &(0x7f00000014c0)=[{&(0x7f0000000280)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000300)="4fd29e8766cae75106cfff5da398a973371df8336d481fdc859a44b6f0f4b4d64dbf0345fccf27eac3279372f9a15c9611b1b00fb3162ac1c67ee6a4cf8fb8094eaa7249872e0a71b0376e5e1fddaae15730511f019a5b0b0117799257792c0a61b92ae2fac878323c61784b3315ed1224cbc1b875174180eb2a025823f2f81f19494993fb62e629c3efd84ea51ee6b18cd853bd659ca84cb5247f4bd666c250d8dfe09472913145b934c18719bc27a390f4372268acefa3a5438d13de0f8af2313d77bab7eedab2c03486d40ec9d938", 0xd0}, {&(0x7f0000000400)="7f454d924b481f8a679da6280f91832ee10e652ee9109b61bb98f1bd5b5f531043690b79de4dbb57b2a2341bbb14d4a011ff6198f6a981fca536c56e45ecbf4191c0853728b9996f5db299ada2817d035c5c1fd4318446d4f9a46b1534acdd32db1423d134509f800e9d684af0c4f35e1a4f", 0x72}, {&(0x7f0000000480)="f8b1f427cfee5dc3db37efeeddc1668231ec75d88106ad40747b6ac8ac57b248f8f7de40bb2c667eb0c995b4211ab5d077bcff5ec543c40dd017fb77612aa2644ee7997702721c7f6a17298227cf48a884541b1445ea5cf712edc914c9a075dfc12eed6a42ff7d3e9b4594c1fe8e91b810faf2c1b811dc3643192b63937b7133dddb3c229e73329731c4f4ea2d7108fac60d0261faac0324f0e28984c591e797", 0xa0}, {&(0x7f0000000540)="97e269cab4262cd62800996303f50443af79bb801a69beea8cf6d298f2953d94cda6f0915180ceefbd6f378d63851e3594f5dac666903a4bde4d48594fe0f30d778daa3e8388f51f23517a8426b11a034f0f4daddbb43b18ba01bdf820e8b242d1f6179ead491d704cb741df90c2c298d17906beac9679bf56b9c4126c52304a18712b7ae45e6cafd810cb3337e33caecf346f02b33db40e9184480478f80b2ef90022dad6be8026ae8e8cec69e3358c6907bb7b6b2adc60b1b03241f9dff3b33bf1f0ccb328630dcbae24ac77f73ac144e46f09def8c5278f8a77c0ce19884525d6a6", 0xe3}, {&(0x7f0000000740)="04d1", 0x2}, {&(0x7f0000000780)="fb5d5ee034601496934be07b57ef4d149bcbea9e5ca880e05d90fd44a0ef206ddd9cbc2641bafda4b9a39407c048ba31de1c37b78b5d6ca05f100fa0e05239e6763d36235073dd30e3c38ff789a6ac49ea4d970cf2445dcf12b11602b9902ce093a26e6a5aaa1db5bad006b7d72e88806495c212d59b40cda90d2ec47f81c57a9b45db4065e40511d2b381ea2f70ae4f378811bf68ce97e84caa6cd70b7fdcf0edcc06c18dfcb11ecefb6261c90cf8e5fcb87eb736523b49a4ae91709022b4557d54177819cc614b129eca1d9b756e962ce41ad7", 0xd4}, {&(0x7f0000000880)="657e57a31acb3d7217b572e554cc35429e31402f932cb922606da46fd57b7c704aedbaa88d7948a93f47388a19e70b699bb3f418fe7c33cc1d394a45f75837d23116fd6209fd7fbf95bc201f06b3a193ddd8707ec6586a", 0x57}], 0x7, &(0x7f0000001540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="00000000a0ec9da1f4dc2eb8c571a5405aa5012dc5677374efe0078343c3a0c0950044b367fce07c1a55095fbee07d0268945a61937dcfa41e5f68b8eb9d8763d8232fa99d82134c6f8d84a48b9b77beb28d5e32c588d39f340258d6cba6be70b7a09e1f3d389f7cdef05ec57ac3217428b17cfce6f39520e4896a", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="000000001c000000000000000000000002000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="00000000141000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x108, 0x800}, {&(0x7f0000001300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001380)="13d241a5925f9001d38b91078e3c0d44da8cee74f3c25adb1a11b85335971a04785d4f4fea934adaa7fbdd7f48c90777344dd25a85795ba88fdf732fcbb37f2e4eb742eecd4ef1f047348fa7ebffb0345fda0cffe0cc8bfee8bd259a09a609ba1126642eefb7d1f7b2ac6b895cca9aa354d3e2eb3cb85af24a0b1753e891894bca998bb12cbc1064df9f49e2385cd8af381abe55d161c0a80dc8b0", 0x9b}], 0x1, &(0x7f0000001480), 0x0, 0x4000000}], 0x2, 0xc001) dup3(r2, r2, 0x80000) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) 13:50:23 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000002a1bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:23 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003a5bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:23 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:23 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000000a6bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:23 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1293.153934][ T26] audit: type=1804 audit(1567173023.504:12800): pid=22967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16612 res=1 [ 1293.201095][ T26] audit: type=1804 audit(1567173023.524:12801): pid=22967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="bus" dev="sda1" ino=16612 res=1 [ 1293.223225][ T26] audit: type=1804 audit(1567173023.524:12802): pid=22967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16612 res=1 13:50:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:23 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003a6bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1293.332909][ T26] audit: type=1804 audit(1567173023.684:12803): pid=22978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16958 res=1 [ 1293.393986][ T26] audit: type=1804 audit(1567173023.734:12804): pid=22978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="bus" dev="sda1" ino=16958 res=1 [ 1293.478982][ T26] audit: type=1804 audit(1567173023.774:12805): pid=22978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16958 res=1 13:50:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @local}, &(0x7f0000000280)=0xc) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:24 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:24 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003a7bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:24 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000000c0bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1293.876365][ T26] audit: type=1804 audit(1567173024.234:12806): pid=22998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=17121 res=1 13:50:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a2"], 0x47) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:24 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(0x0, 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1293.987196][T23006] IPVS: ftp: loaded support on port[0] = 21 [ 1294.001582][ T26] audit: type=1804 audit(1567173024.254:12807): pid=22998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="bus" dev="sda1" ino=17121 res=1 13:50:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1294.104193][ T26] audit: type=1804 audit(1567173024.264:12808): pid=22998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=17121 res=1 [ 1294.309531][T23011] IPVS: ftp: loaded support on port[0] = 21 13:50:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) sysfs$1(0x1, &(0x7f0000000080)='(Rkeyring$\x00') 13:50:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:24 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(0x0, 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:24 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000001c0bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a2"], 0x47) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:24 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(0x0, 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:24 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000002c0bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1294.642602][T23044] IPVS: ftp: loaded support on port[0] = 21 13:50:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a2"], 0x47) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) [ 1295.080301][T23046] IPVS: ftp: loaded support on port[0] = 21 13:50:26 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003c0bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:26 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000002c0)={@loopback, @rand_addr, 0x0}, &(0x7f0000000300)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x2a}, 0x6d, r3}) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000580)={&(0x7f0000000480)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f0000000500)=@canfd={{0x1, 0x81, 0x8, 0x8}, 0x39, 0x1, 0x0, 0x0, "d9950c096ba7e5f64b0d39379ec93a2a7bab88a81e04d957d33ab1e62cdaf20d6ed7f63b48e81cff49a4a1b4cd4178533f024172e3dea077180ab399e7af716b"}, 0x205f62009ee5b747}, 0x1, 0x0, 0x0, 0x1}, 0x10) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x4e20, 0x4, @loopback, 0xd14}}}, 0x34) dup3(r0, r2, 0x80000) 13:50:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c578"], 0x6b) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:26 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000002c4bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1296.616025][ T26] audit: type=1804 audit(1567173026.974:12809): pid=23076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16992 res=1 13:50:27 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1296.733880][T23082] IPVS: ftp: loaded support on port[0] = 21 13:50:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c578"], 0x6b) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:27 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000002c5bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1297.072973][T23101] IPVS: ftp: loaded support on port[0] = 21 13:50:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:50:27 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:27 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000002c7bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c578"], 0x6b) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(r2, &(0x7f0000000340)=@name, &(0x7f0000000300)) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000080)=0x78) r3 = dup3(r0, r2, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000380)={@multicast1, @rand_addr, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000400)={@local, @remote, 0x0}, &(0x7f0000000440)=0xc) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000480)={@broadcast, @local, 0x0}, &(0x7f00000004c0)=0xc) getpeername$packet(r3, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000600)={@broadcast, @empty, 0x0}, &(0x7f0000000740)=0xc) accept4$packet(r3, &(0x7f0000000780)={0x11, 0x0, 0x0}, &(0x7f00000007c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000840)={'vcan0\x00', 0x0}) getpeername$packet(r3, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000a00)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000c80)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000c40)={&(0x7f0000000a40)={0x1e4, r4, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff2a}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r12}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 13:50:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:50:27 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000002c8bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:27 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1297.512100][T23122] IPVS: ftp: loaded support on port[0] = 21 13:50:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:50:28 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003e1bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80), 0x0, 0x0, 0x0) 13:50:28 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003e2bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1298.038114][T23123] IPVS: ftp: loaded support on port[0] = 21 13:50:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000740)="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"}, 0x10) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:28 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:28 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003e3bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80), 0x0, 0x0, 0x0) 13:50:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80), 0x0, 0x0, 0x0) 13:50:28 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000001f7bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1298.498271][T23174] IPVS: ftp: loaded support on port[0] = 21 13:50:29 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:29 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000001f8bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1298.873902][T23193] IPVS: ftp: loaded support on port[0] = 21 13:50:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) accept4$packet(r2, &(0x7f0000000080), &(0x7f0000000280)=0x14, 0x800) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884"], 0x6c) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:29 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000001f9bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:50:29 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:29 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003fcbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:50:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1299.222899][T23214] IPVS: ftp: loaded support on port[0] = 21 13:50:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884"], 0x6c) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 13:50:29 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000003fdbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1299.575183][T23232] IPVS: ftp: loaded support on port[0] = 21 13:50:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7, 0x2) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x0) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x80000) 13:50:30 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:30 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000a60000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 13:50:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884"], 0x6c) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 13:50:30 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c00000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:30 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5"], 0x75) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1300.353573][T23249] IPVS: ftp: loaded support on port[0] = 21 [ 1300.687343][T23274] IPVS: ftp: loaded support on port[0] = 21 13:50:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x1, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000380)={0x28}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x2020000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000003c0)=0x5, 0x4) r3 = accept(r2, 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xdef9c30bc072df3f) write$UHID_DESTROY(r3, 0x0, 0x0) accept(r4, &(0x7f0000000280)=@ipx, &(0x7f0000000300)=0x80) setxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000400)='security.SMACK64IPOUT\x00', &(0x7f0000000440)='[nodev.]ppp1[/cgroup%\x00', 0x16, 0x2) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x80000) 13:50:31 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000400100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)}}], 0x1, 0x0, 0x0) 13:50:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5"], 0x75) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:31 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)}}], 0x1, 0x0, 0x0) 13:50:31 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000800100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:31 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5"], 0x75) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:31 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c00100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x9) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000280)=""/173, 0xad}], 0x2}}], 0x1, 0x0, 0x0) 13:50:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)}}], 0x1, 0x0, 0x0) 13:50:31 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000f70100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x400000000002, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000240)={0xf000, 0x10000, 0x6, 0x8001, 0x7f}) dup3(r0, r2, 0x80000) timer_create(0x4, &(0x7f00000002c0)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000280)="afaa4a36d7620e9c38b0b713383c9749bd61309e0dd727a784af6d82fe340294d455db622db29746", &(0x7f0000000740)="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"}}, &(0x7f0000000300)=0x0) timer_delete(r3) 13:50:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:50:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8d"], 0x79) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1301.347618][T23318] IPVS: ftp: loaded support on port[0] = 21 13:50:31 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:31 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000f80100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 1301.654411][T23336] IPVS: ftp: loaded support on port[0] = 21 13:50:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8d"], 0x79) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:32 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000f90100bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1301.756797][T23327] IPVS: ftp: loaded support on port[0] = 21 13:50:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) fsopen(&(0x7f0000000080)='bfs\x00', 0x1) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000280)=""/212, 0xd4) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:50:33 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000400200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:33 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8d"], 0x79) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:33 executing program 5: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000000029cbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:33 executing program 1: r0 = gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) poll(&(0x7f0000000080)=[{r2, 0x100}, {r1, 0x40}, {r2, 0x18}], 0x3, 0x8001) writev(r1, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r1, r3, 0x80000) 13:50:33 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000800200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:33 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1303.369222][T23370] IPVS: ftp: loaded support on port[0] = 21 13:50:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084"], 0x7b) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1303.460930][T23378] IPVS: ftp: loaded support on port[0] = 21 13:50:33 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000009c0200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1303.610762][T23379] FAULT_INJECTION: forcing a failure. [ 1303.610762][T23379] name failslab, interval 1, probability 0, space 0, times 0 13:50:34 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1303.687943][T23379] CPU: 0 PID: 23379 Comm: syz-executor.5 Not tainted 5.3.0-rc6+ #128 [ 1303.696038][T23379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.696044][T23379] Call Trace: [ 1303.696068][T23379] dump_stack+0x172/0x1f0 [ 1303.696089][T23379] should_fail.cold+0xa/0x15 [ 1303.696106][T23379] ? fault_create_debugfs_attr+0x180/0x180 [ 1303.696121][T23379] ? page_to_nid.part.0+0x20/0x20 [ 1303.696136][T23379] ? ___might_sleep+0x163/0x280 [ 1303.696153][T23379] __should_failslab+0x121/0x190 [ 1303.696167][T23379] should_failslab+0x9/0x14 [ 1303.696184][T23379] __kmalloc+0x2e0/0x770 [ 1303.748190][T23379] ? lock_sock_nested+0x9a/0x120 [ 1303.753209][T23379] ? sock_kmalloc+0xc6/0x120 [ 1303.757803][T23379] sock_kmalloc+0xc6/0x120 [ 1303.762215][T23379] af_alg_alloc_areq+0x24/0x1e0 [ 1303.767056][T23379] skcipher_recvmsg+0x7f8/0xdb0 [ 1303.771899][T23379] ? skcipher_bind+0x30/0x30 [ 1303.776480][T23379] ? _raw_spin_unlock_bh+0x31/0x40 [ 1303.781577][T23379] ? release_sock+0x156/0x1c0 [ 1303.786244][T23379] skcipher_recvmsg_nokey+0x67/0x90 [ 1303.791423][T23379] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 1303.797212][T23379] sock_recvmsg+0xce/0x110 [ 1303.801619][T23379] ? sockfs_setattr+0x170/0x170 [ 1303.806454][T23379] ___sys_recvmsg+0x271/0x5a0 [ 1303.811123][T23379] ? ___sys_sendmsg+0x920/0x920 [ 1303.815964][T23379] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1303.822189][T23379] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1303.827806][T23379] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1303.833251][T23379] ? __this_cpu_preempt_check+0x3a/0x210 [ 1303.838869][T23379] ? retint_kernel+0x2b/0x2b [ 1303.843448][T23379] ? sockfd_lookup_light+0xde/0x180 [ 1303.848633][T23379] ? sockfd_lookup_light+0x103/0x180 [ 1303.853905][T23379] do_recvmmsg+0x27e/0x7a0 [ 1303.858313][T23379] ? ___sys_recvmsg+0x5a0/0x5a0 [ 1303.863495][T23379] ? __kasan_check_read+0x11/0x20 [ 1303.868525][T23379] ? __kasan_check_write+0x14/0x20 [ 1303.873622][T23379] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1303.879159][T23379] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1303.884865][T23379] __sys_recvmmsg+0x259/0x270 [ 1303.889529][T23379] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1303.894542][T23379] __x64_sys_recvmmsg+0xe6/0x140 [ 1303.899470][T23379] do_syscall_64+0xfd/0x6a0 [ 1303.903961][T23379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1303.909838][T23379] RIP: 0033:0x459879 [ 1303.913719][T23379] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1303.933479][T23379] RSP: 002b:00007fd6668f6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1303.941964][T23379] RAX: ffffffffffffffda RBX: 00007fd6668f6c90 RCX: 0000000000459879 [ 1303.949920][T23379] RDX: 0000000000000001 RSI: 0000000020002b80 RDI: 0000000000000004 [ 1303.957965][T23379] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1303.965937][T23379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6668f76d4 [ 1303.973894][T23379] R13: 00000000004c6dd5 R14: 00000000004dc220 R15: 0000000000000006 [ 1304.186316][T23372] IPVS: ftp: loaded support on port[0] = 21 13:50:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084"], 0x7b) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:35 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:35 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000009d0200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:35 executing program 5 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:35 executing program 1: r0 = gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) poll(&(0x7f0000000080)=[{r2, 0x100}, {r1, 0x40}, {r2, 0x18}], 0x3, 0x8001) writev(r1, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r1, r3, 0x80000) 13:50:35 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000009f0200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1305.214680][T23398] FAULT_INJECTION: forcing a failure. [ 1305.214680][T23398] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.279827][T23398] CPU: 1 PID: 23398 Comm: syz-executor.5 Not tainted 5.3.0-rc6+ #128 [ 1305.287932][T23398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.287939][T23398] Call Trace: [ 1305.287964][T23398] dump_stack+0x172/0x1f0 [ 1305.287984][T23398] should_fail.cold+0xa/0x15 [ 1305.288000][T23398] ? fault_create_debugfs_attr+0x180/0x180 [ 1305.288014][T23398] ? page_to_nid.part.0+0x20/0x20 [ 1305.288027][T23398] ? ___might_sleep+0x163/0x280 13:50:35 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1305.288045][T23398] __should_failslab+0x121/0x190 [ 1305.288066][T23398] should_failslab+0x9/0x14 [ 1305.335630][T23398] __kmalloc+0x2e0/0x770 [ 1305.339896][T23398] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1305.346235][T23398] ? af_alg_get_rsgl+0x4f8/0x6b0 [ 1305.346250][T23398] ? sock_kmalloc+0xc6/0x120 [ 1305.346262][T23398] sock_kmalloc+0xc6/0x120 [ 1305.346278][T23398] skcipher_recvmsg+0x267/0xdb0 [ 1305.346297][T23398] ? skcipher_bind+0x30/0x30 [ 1305.346316][T23398] ? _raw_spin_unlock_bh+0x31/0x40 [ 1305.355830][T23398] ? release_sock+0x156/0x1c0 [ 1305.355849][T23398] skcipher_recvmsg_nokey+0x67/0x90 [ 1305.355862][T23398] ? skcipher_sendpage_nokey+0xa0/0xa0 [ 1305.355875][T23398] sock_recvmsg+0xce/0x110 [ 1305.355884][T23398] ? sockfs_setattr+0x170/0x170 [ 1305.355895][T23398] ___sys_recvmsg+0x271/0x5a0 [ 1305.355910][T23398] ? ___sys_sendmsg+0x920/0x920 [ 1305.355927][T23398] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1305.355945][T23398] ? __fget+0x384/0x560 [ 1305.355963][T23398] ? ksys_dup3+0x3e0/0x3e0 [ 1305.355978][T23398] ? perf_trace_lock_acquire+0xf5/0x530 [ 1305.355997][T23398] ? __fget_light+0x1a9/0x230 [ 1305.356011][T23398] ? __fdget+0x1b/0x20 [ 1305.356024][T23398] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1305.356043][T23398] do_recvmmsg+0x27e/0x7a0 [ 1305.370231][T23398] ? ___sys_recvmsg+0x5a0/0x5a0 [ 1305.370245][T23398] ? __kasan_check_read+0x11/0x20 [ 1305.370264][T23398] ? __kasan_check_write+0x14/0x20 [ 1305.380034][T23398] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1305.395192][T23398] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 13:50:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084"], 0x7b) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:35 executing program 5 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1305.395216][T23398] __sys_recvmmsg+0x259/0x270 [ 1305.404917][T23398] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1305.404937][T23398] ? __ia32_sys_read+0xb0/0xb0 [ 1305.416374][T23398] ? switch_fpu_return+0x1fa/0x4f0 [ 1305.416393][T23398] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1305.416411][T23398] __x64_sys_recvmmsg+0xe6/0x140 [ 1305.416427][T23398] do_syscall_64+0xfd/0x6a0 [ 1305.416446][T23398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.424986][T23398] RIP: 0033:0x459879 [ 1305.425000][T23398] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1305.425014][T23398] RSP: 002b:00007fd6668f6c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1305.438416][T23408] IPVS: ftp: loaded support on port[0] = 21 [ 1305.439319][T23398] RAX: ffffffffffffffda RBX: 00007fd6668f6c90 RCX: 0000000000459879 [ 1305.439332][T23398] RDX: 0000000000000001 RSI: 0000000020002b80 RDI: 0000000000000004 [ 1305.439344][T23398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1305.453287][T23409] IPVS: ftp: loaded support on port[0] = 21 [ 1305.454805][T23398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd6668f76d4 [ 1305.454812][T23398] R13: 00000000004c6dd5 R14: 00000000004dc220 R15: 0000000000000006 13:50:36 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000a00200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:36 executing program 1 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1305.845891][T23411] IPVS: ftp: loaded support on port[0] = 21 13:50:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x80000) ioctl$TIOCGPTPEER(r3, 0x5441, 0x0) sendmsg$can_raw(r2, &(0x7f0000000080)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:37 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cc"], 0x7c) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:37 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000a10200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:37 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c00200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x3, 0x0, 0x0) 13:50:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cc"], 0x7c) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1307.455770][T23448] IPVS: ftp: loaded support on port[0] = 21 13:50:37 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(0xffffffffffffffff, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) [ 1307.832129][T23450] IPVS: ftp: loaded support on port[0] = 21 13:50:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = dup(r1) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000001c00)={0x0, 0x0, 0x2080}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r3, 0x200, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x3, @link='syz0\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x20040000) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r4 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f0000000600)={&(0x7f00000003c0)=@name={0x1e, 0x2, 0x3, {{0x42, 0x3}, 0x3}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000400)="98b178584d6ffd6c562dec57e5589c40c18b3389144cadde328c99a9cf389b62f44f80382e54a90d99136eb9a08e61f2d2149c9cd4a810279599080eb8bd9358bfa59c3fed4ca0a94aa751385747ab562e2eae0c03e6ceab5ca8c26da972eb3b6cb9e6e5b4a777aa22c7d230cc22ec866874b67f2665696b24b24a01a354592651fe45bbab5b6b", 0x87}, {&(0x7f00000004c0)="f0f34d41f5f3c20324f9f67390dd642141f86ea0c8f646f4434571b40407f34d7a15a6c6e251b59185252650d6ebf21b33b01b25f76ad7600beca86c68c7d7a381eeab15cef1da81478f32272d3ca1561a08712c24da93e44f39a9570de581fd2b10c5cce41d20dc0a7c296066b8cf9a1221920072ebd21228eeacdf165bd91d853bacb1beb31af8fb0ec32138e213a94b5a95c5ab0c28d0c68b899528f6a0a45ddb8fc64dbf7e6f150c49b6796a11fe09dc7a52f2d954634afe8f", 0xbb}, {&(0x7f0000000580)="b25e6831ac1fdebb3e220d1c04aee8b593c40fb1c53d92ec72b197af2fa3758a2120035069f51a21c43c7a2359bdde2ff7091d6203e0adaf6537bb", 0x3b}], 0x3, 0x0, 0x0, 0x20000000}, 0x8081) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r4, 0x80000) 13:50:38 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c40200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cc"], 0x7c) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x10, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:38 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x300, 0x0, 0x0) 13:50:38 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c50200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:38 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1a0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x50) 13:50:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1308.221963][T23491] IPVS: ftp: loaded support on port[0] = 21 13:50:38 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c70200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1308.692433][T23512] IPVS: ftp: loaded support on port[0] = 21 13:50:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xa8283, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x60000, 0x0) dup(r2) write$UHID_DESTROY(r0, 0x0, 0xffffffffffffffb9) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x2000) 13:50:39 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf00, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:39 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c80200bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x0, 0x0) 13:50:39 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x4000) 13:50:39 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x3f00, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1309.053810][T23539] IPVS: ftp: loaded support on port[0] = 21 13:50:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x4000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1309.415436][T23543] IPVS: ftp: loaded support on port[0] = 21 13:50:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x5000) 13:50:39 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000400300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:39 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf00, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0xda4, 0x4) fcntl$addseals(r1, 0x409, 0x2) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r3 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x1, r3, 0x0) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x2}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r2, r2, 0x80000) 13:50:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x100000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:39 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000800300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1a0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x500000) 13:50:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x8000a0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:40 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1309.740293][T23576] IPVS: ftp: loaded support on port[0] = 21 13:50:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1a0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:40 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000830300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x20000000) 13:50:40 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1310.126266][T23601] IPVS: ftp: loaded support on port[0] = 21 13:50:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x8000000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4, 0x40010, r1, 0x0) 13:50:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x8000a0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x40000000) 13:50:40 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000840300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x10000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:40 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1a0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x7ffffffff000) 13:50:40 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000850300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x3f000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:40 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:40 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000340)={0x5, 0x5, 0x2}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x101, 0x523002) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r3, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r3, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r4 = accept(r3, 0x0, 0x0) write$UHID_DESTROY(r4, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000002c0)={r4, 0x0, 0x5, 0x400, 0x8}) sendmsg$can_raw(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r2, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r2, r4, 0x80000) 13:50:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1a0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x50000000000000) 13:50:41 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000910300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x40000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xf0ffffff7f0000) 13:50:41 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:41 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000940300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x2000000000000000) 13:50:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x8dffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1311.047148][T23651] IPVS: ftp: loaded support on port[0] = 21 13:50:41 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x800) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:42 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000950300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1311.608466][T23684] IPVS: ftp: loaded support on port[0] = 21 13:50:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x4000000000000000) 13:50:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xa0008000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:42 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:42 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000990300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:42 executing program 3 (fault-call:12 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) sendto(r1, &(0x7f0000000000), 0x0, 0x4, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xa0010000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:42 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(0x0, &(0x7f0000002400)=""/4096) 13:50:42 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000009a0300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000740)="50e2aab9fa49243b35fe0f0184b94a4523d88ecbb473b903905a8a1b17abedcb1b25638eb42bd9be0626199de25ca87d0d8fa1fa10a8a0514822551a0f50827f8791d60de9e0023ab06de2af5bd3c26f68c53e7cc3e52ee72fdab1bab56ea6243d31c44124d4224c7496599ad6c4d67e8752be5ff06ddc774c423d10e33e26e30e00630e3139740f134253ab15730fa8536a877e0497d5e3d065b9a216b773939ad9c73bddc8e2dd901e411437044fbe9fedbb4d2a30f3da86845a20c312c6231dfa592830926219538ce7fe56206f7f2aa6aae7d6ff9d5e0e8358814bbef16eadd92c61136ae9c6036609918fb6936b2bc0175971359ecfac6d09556a76a2569257290d109681230562cfcfb5a38307a8f75d02603e9f69c58bf2922299ed0d9b62ce8ec121edd2d769dd43c4738436622ab5ab439e2a569126ccd9507b80947571816e69189c986fed85dd9db4947981d422575a8193129e9c23aa1e1fb00bca0c4c7594715a81001ece83149c3a92de75d70a99e4af38a04494992277c6e9f620fcaf30a7a3dd3a66dfa1c1519cc80d3dd3e8374e63a64610de73538cdfc623aef68999427b55ffc56f1b206b2f19ce46d5a4bd85e09ea763a8476c467694334964be18a273599d4474c0f243d6c9f7ad5657ebe13d73c0dfc49ecfdc65be02fac28c29f5c15152730723822dc11a0545426a22d1f7b89e2182ed1b11db5dcdba0b1855439ebf26ec826cb756d8e9c2216caa68911693e68af24f8df1ea5a6ff7f9433c023ee5a29d24dc0805b144c9e614546c1caea9e519e327f3b4c3a0c569ec49fbecd7a4e90c0c55ebb8a529a693264b26cb3bc340a9b8e0cff7b8e45b2b8e1ca07fbcc811ad9da8646965d3e359d701e84d75eadc8b3ae62e016856b741038c3573a3b55ebae276f6caf5d479971a0c58d1f9eb009080eff144d02359e44abdc83a88131428bf3a4715fc488c622bba6ec82aaa30b17f2589c7906d4b9388f978e0d2543401fe7e0b42c4fde6f1a8552cf41abf9bda5558fe1927e5c95bbb879060f151b5148bda11de85b9288979c624ffd991b70b161edaf6c15bf4cc801f3305af87d7e036baf26bcf7b4a89083548491d2543810c467e7e7af6e31c499c3ccbaa6a20ce894870fc71140019ded043d9604c69fb1f709bfa745e1ef54828bf55e2b110efaa72dd8620ee60ddc35e7f99bc8311f36177cb8d0e3881cfa037e2a7ee402510796d8452fe61dbb92dee5b3fe981540440c04151760036b2e79922d6204c54b9cffe59b338ca806ced472b60ca34db2b9432f2765f6a45fa058425f46969d9866d1da386bd52f77c3ca53e5c4d27af37d3de5af720c754d9d7bf2bc9492bc8fe3494c2c4596ee2239d21de27187299c99a20f6d22bbb1de2a0d9fdcfd255257a7c16aa9be135229d43f3d5f30637619488de67f1a5a9681f1312089f55d95727263689091090a1c9713da513a357eb7f27a20068ff02c4ae4820d8bba2ba69b841ff8a554772a33a74357d7a3f6b49e56d5825d6bb730fc2a608c6042bb3c0701ea19d5c147aa361606bf9b60e81d393dcc684b9e3eea96bf518a11e59e26f945f19cea476d15aed7909c8f83bd5cb1760065f6fac6e58d5fc6af09a258c1f78e148c5f39640e74b0754b5d07f066638e1c2b31d53fd346db6e8340204b440e8807feb989f05fe6c452c4f60b7aa1291673d155c6a197e8699dc24fa255ed54de03747bfcb04202bdac00da0b425b702e463952a1a11b0e6afd39581dd772d7b4090ebeba7a45338eff8aaf6bad3e6a5696e5a7bbe3b196d5a0c2d5e071a5f21cecff4633a310b93d981da3349858bd74cb0fe1a775b2329c2e91d7868d858e9fe33e4c565e5f46c047415f37a3d95be114018b13a11cd5fc105956ecbf47fd4bf7f36aa8fe4fd8888cb08a095e2bed68ef9985fb8084724809470a83de5610a4dce3153342d77b2a13d62bf439c647cdade97489a5aeea489b6d573635ca35460d003d084ad8837a53f4451e78e873ee87c423a52b4362f73c6aa988290f510abbe49d40cb4daf7cb3581f08515a7a25f4c0df9d120d59fa427d33da0ddba8bffeb8f13bd46d2ab74f51c0d7c7962150d2288bec002b707c4fc962eed09df86013e16cef49b7e9d2dda335fb6b8a2c1ad32074a56ed9f59bc15ed145f935954c30cf418cdb6b8561398697b86b65232ff28c7142a8e0be353054a245e1283c06b0e745888597ec14ba11036ea02a1f30af406108083c895460144e8489fb811d5bbdbfae75dae115297f99ca52d8907b32771dc53f803119b916a5d79ed09e50d1803a8ef59d2b86226a81400296489ac4d363056f8dcc0d379f9047aad55a67c6433dfba3e9462d9063014deac4110ac85a6be44936f2e3f6b436f04a7ffa6e086d957b4f616969b6c7db81a5623d1d72f782cc2b620d0106d54dbd3f5a906bb2df184cb2b0d4ea96d200f126cf51a915f5a3c81151bce16658f429a9bf2445ed3151effa74dbe5b7acd16345341c049b55b6acb2908348562dc3714f6a0234098caa6505559e5850b75a5be7125c091d8695f314c3c513238938eda5b04336947e893194abae5a360a5ff4a1514682300398f69383f2d94e122edad177de184f6e0adb5d3bbb88ef1f7febb2e45228030379a3600cb091d80f600b7054e58d7a78aab0d5f8bdc9276c4b4e305c456950b327a03138395a1809e10ec591362bc91129c164b65e034e96c73420f6c67e694166ef0889d56676e75fc085e81018fe32f35a2421cf8fa480bd952c37d8e9f78e69160fb1a962a0b15bb9d7b6170a00883ac5a3a68c10d722d9777387183e453768bdeb9cf97057ee0846bb6c055eb942fdfea094dc00d5ab676d121dadbc0a10d68d335d7c085051350a62964ec7f9289671ea620d46a0752614cbb99006f4e929bc725f5fe0d5949168279fd25ac20ec26a503f7b1474f460f083d701155f206a895d0527fe2398e9308299c16a63acf2d2ae7d66d08c741d8a650d92b148b41379a552d78cd7b0557921582092f75480451ee56dfa286fb7cb70a374e819fbcb5391942dee2dd9a23c767c52f650a63bbd381d4cf36b2b689128e4c1e57c3a2921fdee0abe279d1b513fb214122c28ffdcc9e99f0ee600a1a2a9265342800bf832da553b88a64a585c65ca88aa7a320d6ea33b37cbdd22015e402050dbdd739d9a437fb3b3b0677a744cddeeee8183231ca731ba89e3692bf31acc76cdb9153747259388d2c51cabb1dd0c7ba6199f9c15ee9cc722d02be2da7c9fb3b1bf7bf4c1e3e763042bfe22657f5c2552e60d25ec6d5749e6b2e695c8278938f84075d6e3cc1d10e16d692e0abfb81cee56b100550e38faef9af4fc3e649e9e5cb01a49b56331c5ccfe4fe55cf47731ac4de32918df43bb3834321c4c9b8d613e198d479508e4089173515d5d8bb3da1966932d500f3fee53f87dce439dccfe8309e99ccf413af69b059a064a19070d11438715866da976f9dda788de4591da2715a5dc5fe97a8b771e561c12079ea3ddcb3abcde2b982e62e4e19898a8bb23e95d91d23e96ec855fc5ce30d6ef765c19fcf734f250a183024a87ab9b7b034c583fe8622b968ca831713329b1db2ae56500ac7f5b68f5232d5382b1d7e9b5f6732472a59bd7880f67e42bd5ba908399b439fa31a8786ff84a26f565a5ec979a7a8a4ecb117956c791c4bb2d41243ce7f23b3e647788982df69cd4d630285d64170f2d3e43a27a314b40d00f6ec4a3668785569c2417707876422464b106948e3685779f9b782f2490ccd59a43dc6dd8334cebe7a7c483f87d95e451d1248cc93939d12c8a65372e01fce1be50dd5f27523ffccc4b4cb81b830f13146b47abc845d55700bae945264eaa3310aa366624c17b95faeb355774a3e6c6218cc58c76bdc9868e5e6249864c4c972e0f04fba1849f995f1a5be3dfe07b3e5f69bbb15bc854162922e06b6faa9f65d8eb4d9f2578812fc52c15358b9e4222e5d2d83e7d6570f8df59b0947dc977bbdf2792725060a521d158c70f53ec99e58a25dae16f7737d78485182c23b8b19179b283db762bfdbd5b725333e0bafae0be381d9afa910772759a1b016ae3133886b34c93f38db69b431cd069ad117723ba7bfe786516038a28701b8a74a4647499e41d2bf76443ab540cf2c205d777529dc1cd155618a923cfb3b4e57565e6b3ef0189317b1fea4a262ac35026c906f91022ef7bbbe77c79a23f7d127519c2f46018e2894816390e7fd00e947d6a70c68fac3797a44e4ec32b03df3de8e7f53423ad309f95ed50f6e69d9e40ad8eca0adacbcc038ebb6e2c58a055527ed57a71787870c8c2af5f69ac96dc67553d4218441e7d27c63b1e5d7faea690ac99e45e44ed617c1c48903dc70ae1ef0752bb104487d2c66bbe02876078455c5f29aadacc69ac370b5c7e6cd9e536ab2e7e305d3cf4c5d023a6145fd8f1fefb7551ee24a29962f3000b3d76cdee8f4e3ebe75c5007079331718005c271aa4efd1813d4cee5b0f983caf00452290e013d4ab99da1a767bb7a681a30eccdd63ca63da92a4a3c1fea50791571dab484be2dc024accf4075efd587a4d288dd89504ab67a90657e4d645f3313e08adc9aff588b73e37b566bd60bfdd9dd8a9f80f33253a301b0a5c1a0fcae12a366aff87d7bb8ecc47155839f9c8dfbe7d815bc4cc52aa60886bb82af355bea83a67a55860d58df89eecc014391ea7f6502485dc02a60f7062c27a84a1e931d10948b4f61b34836005db0a69e839d5cf2e9c2954783b43e9e92f5983844afb475191bc6c153cda580a34881af80f5f72979fca409655cde419488a83eb48a4c5d98bfe278a99b774d3f77ac7e06880f41cc08e82fd07b66a54fca2e2c993bc49e1b4fe29f8cc7b76b772c94c6f0f747694ca4acd13cc863d138cae51e1d3943f0e71101144756ebb50ecc16cf9361f03dca7b659b6d5ef4ac17030ab527b0f0590456e423216129b6372466d3b6c06cb5688b9541499fd2bd81bc292a4c4f378e1d59cba050aac9cdddcc77170287414e9fa2fd50d4da232bb58ae99a519b329e49844bbeb95599380ab4b23d6dad2385a69e4b7cd7aa88258b7df496c5f47a67630232a497d26c5f00efa1228e037f4fc0d27f2ef0339c793b30b9a0fc58adcb5bc2a79f1f7055ec4a4fb5d123fb927aff1e71eeafab74bd072a540eda75ec92f3e7c2195d397d62837b5a25a2667024578229ed4248e05b9c158f6d428f8bebb27b26d8a5fb2d6bedccf695e879633aa59fa5a8922675633211ef047cb7dd1508a00e5fb820ce37a08527e7597e7f41800701b869663936dea5fc47cf47385d1bb370498754bb45b41e963b27a7b6b3cbaea4e13c3536f89be71ee99da7c4bedf778cd38c033c7465e877a3926780245cf39572ddfad51409fdb7c89018f81b0224602a10f886f26c2a79bf22f66dbb7bd3d5957533e5ffb657191271808ead62409da4084b8d037cf65300939ed10406e3f564f83bd31c05c2909ed1a0a7e6ffb94ffae6ddf80dcfbed0552ef84086e0180f6ccac678dba8ccfeeb2c0e7e39f454a47e478e356389096ee5f85adbeeda50a8ed7a5440a98a2cc579b8bf7705afa7e3dc3578493d0b43b3120b9f8174ad47c3a98ce49abf6085043a449dee7d566b61f97537a718abb4c16ffa74e15711aca974bb976262bf49c4dc72a5db1700627faa53e0b378ad8b2302cfde89056503e340c4eef90a0fe34b3077eb45d103ae4e30a9f3a0ad242fae0ee1e51111638c48c9", 0x1000, 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="68bfce8904a59df676e0a16f134f71115ff7f6f79eea1c231c2ad0d2dd36f639f882e743db080fc0a521a04fcb2def5dd284460fc208b1e97cd9932513ef4689fc0a23d40a08ad98b95822f16096890a2cd7c8c163fe82905a0a6b98509324d740d17c28cfb3c0e07da033da73c13ef00cf53fbfe6b341992c4f547c380f38d72ed5d410d1f2846ec4e4b06bb96bdd3754e6e31ae1d0e4", 0x97, 0xfffffffffffffffb) keyctl$search(0xa, r3, &(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x1}, r4) 13:50:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 13:50:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf0ffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1312.231890][T23708] FAULT_INJECTION: forcing a failure. [ 1312.231890][T23708] name failslab, interval 1, probability 0, space 0, times 0 13:50:42 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000a50300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1312.333545][T23708] CPU: 0 PID: 23708 Comm: syz-executor.3 Not tainted 5.3.0-rc6+ #128 [ 1312.341649][T23708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.351804][T23708] Call Trace: [ 1312.355102][T23708] dump_stack+0x172/0x1f0 [ 1312.355125][T23708] should_fail.cold+0xa/0x15 [ 1312.355146][T23708] ? fault_create_debugfs_attr+0x180/0x180 [ 1312.355162][T23708] ? page_to_nid.part.0+0x20/0x20 [ 1312.355181][T23708] ? ___might_sleep+0x163/0x280 [ 1312.355212][T23708] __should_failslab+0x121/0x190 [ 1312.384900][T23708] should_failslab+0x9/0x14 [ 1312.384916][T23708] kmem_cache_alloc+0x2aa/0x710 [ 1312.384930][T23708] ? apparmor_capable+0x2ed/0x630 [ 1312.384941][T23708] ? cap_capable+0x205/0x270 [ 1312.384958][T23708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1312.384977][T23708] getname_flags+0xd6/0x5b0 [ 1312.384991][T23708] user_path_mountpoint_at+0x29/0x50 [ 1312.385012][T23708] ksys_umount+0x167/0xf00 [ 1312.394438][T23708] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1312.394460][T23708] ? __detach_mounts+0x2a0/0x2a0 [ 1312.394474][T23708] ? retint_kernel+0x2b/0x2b [ 1312.394489][T23708] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1312.394502][T23708] ? trace_hardirqs_off_caller+0x65/0x230 [ 1312.394518][T23708] __x64_sys_umount+0x54/0x80 [ 1312.394531][T23708] do_syscall_64+0xfd/0x6a0 [ 1312.394546][T23708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.394557][T23708] RIP: 0033:0x459879 13:50:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400840, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 13:50:42 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(0x0, &(0x7f0000002400)=""/4096) 13:50:42 executing program 3 (fault-call:12 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1312.394572][T23708] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.394579][T23708] RSP: 002b:00007fa154c10c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1312.394591][T23708] RAX: ffffffffffffffda RBX: 00007fa154c10c90 RCX: 0000000000459879 [ 1312.394605][T23708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000980 [ 1312.404175][T23727] IPVS: ftp: loaded support on port[0] = 21 [ 1312.404464][T23708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1312.439912][T23708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa154c116d4 [ 1312.439919][T23708] R13: 00000000004c902a R14: 00000000004e01b0 R15: 0000000000000005 13:50:43 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000a60300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xffffff8d, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000000c0)={r2, 0x80000, r3}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:43 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(0x0, &(0x7f0000002400)=""/4096) 13:50:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xfffffff0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1312.877674][T23747] FAULT_INJECTION: forcing a failure. [ 1312.877674][T23747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1312.890909][T23747] CPU: 1 PID: 23747 Comm: syz-executor.3 Not tainted 5.3.0-rc6+ #128 [ 1312.898982][T23747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.909045][T23747] Call Trace: [ 1312.912347][T23747] dump_stack+0x172/0x1f0 [ 1312.916711][T23747] should_fail.cold+0xa/0x15 [ 1312.921314][T23747] ? fault_create_debugfs_attr+0x180/0x180 [ 1312.927139][T23747] ? lock_downgrade+0x920/0x920 [ 1312.932003][T23747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1312.938265][T23747] should_fail_alloc_page+0x50/0x60 [ 1312.943468][T23747] __alloc_pages_nodemask+0x1a1/0x900 [ 1312.948887][T23747] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1312.954607][T23747] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1312.960251][T23747] ? __kasan_check_read+0x11/0x20 [ 1312.965289][T23747] ? fault_create_debugfs_attr+0x180/0x180 [ 1312.971104][T23747] cache_grow_begin+0x90/0xd20 [ 1312.975866][T23747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1312.982094][T23747] kmem_cache_alloc+0x64e/0x710 [ 1312.986942][T23747] ? apparmor_capable+0x2ed/0x630 [ 1312.991953][T23747] ? cap_capable+0x205/0x270 [ 1312.996636][T23747] getname_flags+0xd6/0x5b0 [ 1313.001129][T23747] user_path_mountpoint_at+0x29/0x50 [ 1313.006420][T23747] ksys_umount+0x167/0xf00 [ 1313.010837][T23747] ? ksys_write+0x1cf/0x290 [ 1313.015331][T23747] ? __detach_mounts+0x2a0/0x2a0 [ 1313.020267][T23747] ? __ia32_sys_read+0xb0/0xb0 [ 1313.025016][T23747] ? switch_fpu_return+0x1fa/0x4f0 [ 1313.030111][T23747] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1313.036432][T23747] ? trace_hardirqs_off_caller+0x65/0x230 [ 1313.042153][T23747] __x64_sys_umount+0x54/0x80 [ 1313.049076][T23747] do_syscall_64+0xfd/0x6a0 [ 1313.053569][T23747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.059446][T23747] RIP: 0033:0x459879 [ 1313.063325][T23747] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1313.082923][T23747] RSP: 002b:00007fa154befc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1313.091317][T23747] RAX: ffffffffffffffda RBX: 00007fa154befc90 RCX: 0000000000459879 [ 1313.099275][T23747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000980 [ 1313.107230][T23747] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1313.115182][T23747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa154bf06d4 [ 1313.123140][T23747] R13: 00000000004c902a R14: 00000000004e01b0 R15: 0000000000000005 [ 1313.149456][T23754] Unknown ioctl -1072929747 [ 1313.161062][T23754] Unknown ioctl -1072929747 [ 1313.343127][T23763] IPVS: ftp: loaded support on port[0] = 21 13:50:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f00000002c0)) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000300), 0x2) r3 = accept(r1, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000180)=0x8, 0x4) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(r3, &(0x7f00000001c0)=@name, &(0x7f0000000080)=0xde25) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000440)={@local, 0x17, r4}) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x80000) 13:50:43 executing program 3 (fault-call:12 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:43 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000a70300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) accept$inet(r1, 0x0, &(0x7f0000000000)) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1a0ffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:43 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', 0x0) 13:50:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2a8100, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000280)=0x1, 0x4) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x200822, &(0x7f0000000080)={[{@xino_on='xino=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}], [{@obj_user={'obj_user', 0x3d, 'skcipher\x00'}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/65}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:44 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000c00300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x10000000000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1313.744939][T23785] IPVS: ftp: loaded support on port[0] = 21 13:50:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:44 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', 0x0) 13:50:44 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000e10300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1314.335736][T23787] IPVS: ftp: loaded support on port[0] = 21 13:50:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) fallocate(r0, 0x20, 0x1, 0x2) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000002c0)=r3, 0x4) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r2, r2, 0x0) 13:50:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000000)={0x9, 0x3, 'client1\x00', 0xffffffff80000000, "11a46ceff5dd0677", "c562aea51872a4a1096fe5293e51dc1fd3c4f80feeab29577304ba7bfe0705ae", 0xfff0000000, 0x1}) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x2f) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 13:50:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x8000a0ffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:44 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000e20300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:44 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', 0x0) 13:50:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x2) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf00000000000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x4e23, @multicast2}, {0x306, @local}, 0x36, {0x2, 0x4e21, @broadcast}, 'irlan0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:45 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000e30300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1314.733985][T23834] IPVS: ftp: loaded support on port[0] = 21 13:50:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x1a0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:45 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000fc0300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1315.180710][T23837] IPVS: ftp: loaded support on port[0] = 21 13:50:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x301000, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000280)=0x100000000) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000300)={r4, 0x80000, r2}) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) mq_unlink(&(0x7f0000000340)='\\\x00') dup3(r0, r3, 0x80000) 13:50:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1000000000000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x8000a0ffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0xff) 13:50:45 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000fd0300bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x4000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x8000a0ffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x3f00000000000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:45 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000020400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x8000a0) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x1a0ffffffff, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1315.592575][T23879] IPVS: ftp: loaded support on port[0] = 21 [ 1315.924626][T23901] IPVS: ftp: loaded support on port[0] = 21 13:50:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) accept4$x25(r2, &(0x7f0000000380)={0x9, @remote}, &(0x7f00000003c0)=0x12, 0x80800) r3 = dup3(r0, r2, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0x8e1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x1bbef6dc, 0x4, 0x204b, 0x1, 0xb1}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000340)={r4, 0x0, 0x2, [0x7, 0x2]}, 0xc) 13:50:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x420500, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000140)=0x10001, 0x4) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000080)=0x8, 0x4) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) signalfd4(r2, &(0x7f00000000c0)={0x8}, 0x8, 0x80000) 13:50:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x4000000000000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:46 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000080400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x3f00000000000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x1000000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = dup(r1) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000540)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x300, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x2}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 13:50:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000740)="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", 0x1000, 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="68bfce8904a59df676e0a16f134f71115ff7f6f79eea1c231c2ad0d2dd36f639f882e743db080fc0a521a04fcb2def5dd284460fc208b1e97cd9932513ef4689fc0a23d40a08ad98b95822f16096890a2cd7c8c163fe82905a0a6b98509324d740d17c28cfb3c0e07da033da73c13ef00cf53fbfe6b341992c4f547c380f38d72ed5d410d1f2846ec4e4b06bb96bdd3754e6e31ae1d0e4", 0x97, 0xfffffffffffffffb) keyctl$search(0xa, r3, &(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x1}, r4) 13:50:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x8dffffff00000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:46 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000a0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1316.268621][T23923] IPVS: ftp: loaded support on port[0] = 21 13:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x2000000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xf0ffffff00000000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1316.616970][T23932] IPVS: ftp: loaded support on port[0] = 21 [ 1316.764868][T23929] IPVS: ftp: loaded support on port[0] = 21 13:50:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0xec) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:47 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000c0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xffffffffa0008000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x40000000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:47 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000d0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = semget(0x1, 0x2, 0x4) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)=[0xcd0, 0xffff]) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x93, "cdd133a299feca2ba1c87bcdd9a72191da020fa341a5763a5467a0118a67435dcdef81bda3e5b70490d55bbf03c912af75f89f41a8e1c22e7f82c0fe3a2919000f6afc2e43fd2b4c778b36ff85e2deddb5a656c6393b26be44a49d1c479ef07e75fb3d34f790fb84bd767186f94cae6db14c514837de57b7c51923d852296626b384977ee52905aaed0d72dfd401b6ca7f95f2"}, &(0x7f00000000c0)=0x9b) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r3, 0x6, 0x8000, 0x2}, 0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1317.078067][T23968] IPVS: ftp: loaded support on port[0] = 21 [ 1317.349320][T23971] IPVS: ftp: loaded support on port[0] = 21 13:50:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xffffffffa0008000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xffffffffa0010000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x8cffffff) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:49 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000000e0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000100)=0x800) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) time(&(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000000)={{0x4, 0x20}, 'port1\x00', 0x10, 0x1060, 0x80000000, 0x2, 0x67, 0xffffffff, 0x3, 0x0, 0x5, 0x6}) 13:50:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000001040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000001180)=0xe8) syz_mount_image$xfs(&(0x7f0000000880)='xfs\x00', &(0x7f00000008c0)='./file0\x00', 0x7, 0xa, &(0x7f0000000e40)=[{&(0x7f0000001c00)="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", 0x1000, 0x6}, {&(0x7f0000000900)="8dc6905f485151bdad02d9527f0dd0601da33d488cbc1a985b5b8ef1909560e366fb56", 0x23, 0x30000000000}, {&(0x7f0000000940)="e0b8e8ea2ac2034409079bd0212460ce7b5b6cced0f71be0dbda2c54aed16b5d62482f90d00a8ce7637bb9a071eb6af3ade54706f4c9b95019a9df404670d95db5262aaee2cd612aa7b09562da77bead3dbd4c633011d97ada740cb2f1d4492864e09af64d7f15401fcf5e43fa61deb3defdf4b0833c007c0fa97dee7e444a182ed46d98fb5de2b6b5d0d8821d643dab1a44533275599f72496376f91ff5181ed17650d6", 0xa4, 0x5}, {&(0x7f0000000a00)="7d4c455e6fe4fa8d63fcd9b82a7374f2c36bdc4a3d070e4b03040dc0dccfff8d89a116f9a03908120be74c12654ad9728d9d5a6f8c2ff32902d48727da7edd19b16efc556cc7c62bd552f4482b8bd9e340572147e12e81b5f1a6919a34587964839d3813bf4234c115008a441a157b3db4ff424709c2a1f0fa40214d96efa832ff57c54466", 0x85, 0x4}, {&(0x7f0000000ac0)="322ace8123d3597be4cbe3cf142212d9a0ccf31e77196dfee4355cec81a24b9a4591c50867322b8deff573f92987cb1bcbcf11dfedf2b5191a1885c76904692c622dd3fb38c267bba5cd8f75a9e272b9081841aa85405689028fe048eecbc8fa76da55b651520de843bdc8a9393facd78f1e1dfbdd4799744d2bfd4d51f9d691c9fb453996d499", 0x87, 0x401}, {&(0x7f0000000b80)="4d50427d0fa12838367c1440d8d356f44b1c282154086d1afb585a3d203b464134eb6255de72b9b0161899d97b20c5134fb9e237815dea138d1bdedc25f2c028e18cde68f28fb8fc4e376a2da181884160df76c707a6aaf8604b342f0699dc6a2817fc6e156323c53062f0c57dc1d18095e74166e0013117c4740a6426", 0x7d, 0x80000001}, {&(0x7f0000000c00)="624a0c7a2bc6350f795c89744149f5a6a411df9d1e461643a68fa44d2c96298b93f9084b6241ca20a3abf6a5fb668ebf5d127b6348159873915090dee6746c242d5b688a14956a739bc3d3b2f881f1f61ab43e29ba8e2bbc2df3a2276fb890c910bb26010a2bda4b1927b1032bd0ecb290c2d82dc5f49bd10e17b098598933", 0x7f, 0x9}, {&(0x7f0000000c80)="69c6cedc8cf6ce31fc54eb40670aeaac3c36b60da91cf4ab3fb846183540ab8cb279dbb88a97615b74d38bd8818d69707e0ec0f7ff4e3f5f83c7bb59f887a941d8ffabea9b567ea1d3cedaf6", 0x4c, 0x8}, {&(0x7f0000000d00)="65115f6dff681da04b32685e3f1653ab41b5028a8a0c6fd2aff5248bf39905e9acfe7300f2d4dd579ddf8b9fe0b61a89e29eedd285beffc743798e2f1d6cc6aaad", 0x41, 0x6}, {&(0x7f0000000d80)="6353145e3446a187c0a41f8ae0956bd29dbbaa3b5d82ec6e399b9fd8fabe5403c44d7f6be58f63fbc37b5e600a47c5a011264c5929b87c4d3b90c6d06f9a5ef4ffea9b153c3176567284672fd6eabc57ffb199fa33b2a566e5f6c3e218c2a2ccaadb5ef52ef805fd70448393924b9ab3581afeed4b2edc80d7f5cda1537252ddeed04853d87804302ce7ffd246fd4ca089d6fde9e5cc5f516ad7a8923fa20e47d8037fdbbb69549f89f24587d5331d573506946e330f387cf83b", 0xba, 0x40}], 0x120001, &(0x7f00000011c0)={[{@nolargeio='nolargeio'}, {@dax='dax'}, {@swalloc='swalloc'}, {@sunit={'sunit', 0x3d, 0x5}}, {@gquota='gquota'}, {@gqnoenforce='gqnoenforce'}, {@nobarrier='nobarrier'}, {@ikeep='ikeep'}, {@inode32='inode32'}, {@nodiscard='nodiscard'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'trusted.*.(vboxnet0wlan0'}}, {@fowner_lt={'fowner<', r2}}, {@fowner_gt={'fowner>', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x0, 0x35, 0x61, 0x62, 0x66, 0x38], 0x2d, [0x30, 0x65, 0x63, 0x77], 0x2d, [0x65, 0xe974171411091d1d, 0x35, 0x62], 0x2d, [0x37, 0x37, 0x34, 0x39], 0x2d, [0x62, 0x30, 0x63, 0x66, 0x39, 0x39, 0x32, 0x37]}}}, {@seclabel='seclabel'}, {@measure='measure'}, {@subj_role={'subj_role', 0x3d, '@'}}]}) r5 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x3, 0x80000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r5, 0xc018620c, &(0x7f0000000380)={0x2}) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r6 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r6, 0x0, 0x0) r7 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_JPEGCOMP(r7, 0x808c563d, &(0x7f0000000280)) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000000400)={@initdev, @dev}, &(0x7f0000000440)=0xc) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x210200, 0x0) sendmsg$can_raw(r8, &(0x7f0000000200)={&(0x7f00000000c0)={0x1d, r3}, 0x10, &(0x7f0000001340)={&(0x7f0000000740)=@canfd={{0x4, 0x8, 0xfffffffffffff800, 0xff}, 0x34, 0x3, 0x0, 0x0, "41c9a647a6b384312ff0afdf5f6717d0f0e2533ff6d58b74698a435757009016d71934071206f68551dc821f5da375e9bb857233bd2e213d1293f916ed18e3f8"}, 0x48}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r6, r7, 0x51e8e00e946acafb) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f00000003c0)) ioctl$UFFDIO_WAKE(r8, 0x8010aa02, &(0x7f0000001300)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) r9 = syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') fsetxattr$trusted_overlay_opaque(r6, &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x1) ppoll(&(0x7f0000000100)=[{r8, 0x1c0}, {r0, 0x2000}], 0x2, &(0x7f0000000800)={0x77359400}, &(0x7f0000000840)={0x99}, 0x8) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r9, 0x200, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000814}, 0x20004050) 13:50:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:49 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000100400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0xffffffff, 0x3ff, 0x80000000, 0x3, 0x3e, 0x8, 0x2a2, 0x40, 0x1e, 0x1ff, 0x80, 0x38, 0x2, 0x100000001, 0xfffffffffffffffe, 0x72db}, [{0x70000000, 0x8, 0xffffffff7fffffff, 0x7fff, 0xfffffffffffffff7, 0x749f, 0xae, 0x6}], "5184a87a283c079d0bcb03445a331b9e40e89d81a3d48c57d8ee0dc20eed1cbf7e3bc7028c7e4a3c384c71ba0fd620f61c0a7666ea65051e2891b2a4e469b6051af95817aaf703462a1f2f8fe80d8db133f40683cfa2ff57221930b92681241d233300ccffeb8353e0826acc4f5bf5c25b8b6d671dd47224b2d6fcd9e0383ce42bf5a9", [[], []]}, 0x2fb) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xa0008000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0xa0008000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:49 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000300400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000000)={0x9, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfe29) 13:50:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0xa0008000, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1319.486718][T23987] IPVS: ftp: loaded support on port[0] = 21 13:50:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:49 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000500400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1319.813900][T24037] IPVS: ftp: loaded support on port[0] = 21 13:50:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f0000000280)=@netrom={'nr', 0x0}, 0x10) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x80000) 13:50:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0xa0010000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000000140)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/181, 0xb5}) 13:50:50 executing program 4 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:50 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000600400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:50 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b7020000006f0400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:50 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) [ 1320.513285][T24068] IPVS: ftp: loaded support on port[0] = 21 13:50:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0xf6ffffff) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:51 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000700400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1320.905549][T24088] IPVS: ftp: loaded support on port[0] = 21 13:50:51 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x40002, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r1, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r3, 0x72e90ba4e7cfab9) 13:50:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:51 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000500bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffffffffffff7e) 13:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0xffffff8c) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:51 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./control\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@md5={0x1, "ea012e73a0729715917431eee12d6caa"}, 0x11, 0x2) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@remote}, &(0x7f00000002c0)=0x14) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x7, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r3, 0xeaf1, 0x20}, &(0x7f0000000240)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x30, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0x10, 0x4, 0x200000009}) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:51 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000600bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:51 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x83da, 0x8f, 0x4, 0x1]}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f00000001c0)={0x91d1da8e3b997485, 0x1, [0x5, 0x0, 0x6a0da51b, 0x679, 0xffff, 0xfffffffffffeffff, 0x1, 0x2d16]}) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000140)={0x8, 0x4d, 0x3f3, 0x8, 0x1d, 0x5}) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x19ef}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000380)=@sack_info={r3, 0x2, 0x9}, &(0x7f00000002c0)=0x6) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffffffffffff0001}, 0xfffffffffffffe8d) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x5, 0x5, &(0x7f0000000280)={0x8}, 0x8) 13:50:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0xfffffff6) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) [ 1321.371515][T24113] IPVS: ftp: loaded support on port[0] = 21 13:50:51 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_init1(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000080)='\x00', 0x0, r0) 13:50:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x2, 0x1, &(0x7f0000000080)={r2, r3+30000000}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}) [ 1321.724382][T24113] IPVS: ftp: loaded support on port[0] = 21 13:50:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000280)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r0, r2, 0x80000) 13:50:53 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000900bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:53 executing program 4: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x1a0ffffffff) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x9, @empty, 0x2}, @in6={0xa, 0x4e21, 0x7, @rand_addr="f418c9fcbc18f4fe42fc6dbd0567b04f", 0x9}], 0x38) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000009c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e009663337dc7593e6094fdb425de000004000000000400000000000000000000200200002001000000000000680300006803000068"], 0x1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x12000, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000140)=""/233) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCEXCL(r1, 0x540c) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x400}) 13:50:53 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000a00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0xffffffffffffff28) accept4(r0, 0x0, 0x0, 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 1322.964958][T24169] IPVS: ftp: loaded support on port[0] = 21 13:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x8000a0ffffffff) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:53 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000b00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:53 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r2, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x0, 0x4, 0x3, {0x73, 0x81}, {0x8001, 0x5}, @rumble={0x422a, 0x7f}}) [ 1323.365902][T24174] IPVS: ftp: loaded support on port[0] = 21 13:50:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000080)=0x1) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x34, 0x2f, 0x12, 0x1, 0x9, 0x2, 0x2, 0x3, 0x1}}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:53 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000d00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x100000000000000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:53 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41111824}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x200, 0x7, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:53 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x7, 0x80000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000340)={0x1, &(0x7f0000000280)=[{}]}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000080)=0xffffffff, 0x0) r3 = accept(r2, 0x0, 0x0) write$UHID_DESTROY(r3, 0x0, 0x0) dup(r0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)) writev(r1, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) dup3(r1, r3, 0x80000) 13:50:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000000e00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:54 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x24900, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha1\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0), 0x0, 0xfffffffffffffff9) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000100)='posix_acl_access:\xf5-lo\'@-!,\\*\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) [ 1323.720916][T24214] IPVS: ftp: loaded support on port[0] = 21 13:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x200000000000000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000001400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:54 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) statfs(&(0x7f0000000000)='./control\x00', &(0x7f0000002400)=""/4096) 13:50:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, [], [{0x3f, 0x399dcb35, 0x7, 0x10001, 0x401, 0x3}, {0x80000000, 0x41, 0x8000, 0x0, 0x0, 0x1ff}], [[], []]}) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x4) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000180)=0x5) [ 1323.992901][T24222] IPVS: ftp: loaded support on port[0] = 21 13:50:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000004000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40040000) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x2, 0x4) r2 = accept(r1, 0x0, 0x0) write$UHID_DESTROY(r2, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x0, 0x8, 0x1, 0x4}, 0x0, 0x1, 0x0, 0x0, "e917d4858d205603"}, 0x10}}, 0x40) writev(r0, &(0x7f0000001b80)=[{&(0x7f0000000640)="f73d5358f39f4dc87eb110ac7b869be0a3279ce077b02d4c260a6c9a3667b8897bcf71ba684c2986c61dce9fb810e6d788d366355764e705be4772b2d0f61b13d339e1b10d70d3a5b3d32b54ddcd24232a9e8e6f9285df37fecbb0ca7e37aa7bcb026355f139f51b0c126fda736973c0b73e38a4ce3a91559825188e59a3a94b28294700645669bc53313be73fc2a86cc65153644f2f75c7e9e324a391d8ad497a28d7e5a4f0868131ccfddaea1c347c2ba0257a46a8d9f9c4f250ae26736ac20111", 0xc2}, {&(0x7f0000000740)}, {0x0}, {&(0x7f0000001880)="71c66c212cf6b8de7c46e91acc6f251d7bb606f492652d572256fe382d95f91329dbda087ea50a2b74d3cbaee7f2fe7709a1fe", 0x33}, {&(0x7f0000001940)="2d8714be9dcd8e6665918dd6a5571919de56ae827d0c0ae44d864714792e7c77c8afb2b2b8162f279c5df750827ecdedaea3d89346a465d880c117c904e00d609df31175210c0de6808931b343eb3eaf113ac733a0510f8df4c439314268c408339271542bc2f911434d2d7765bdeb7ca28e8e9c456427ce7da81103482fb2c51bc4846b15febf4baab2a93487d5f85fb41de844219f5076bd510cd42cdbb6aec647f9940011be60", 0xa8}, {0x0}, {&(0x7f0000000080)}], 0x7) r3 = accept(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000080)=0x80) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000300)) dup3(r0, r2, 0x80000) 13:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x4000000000000000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:54 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b702000000034600bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xaf, "eaa164c79c399fc67cf095cf00ba43b24d4496f2417be7d85e677c8ceaf812dd91c22d1b91bcd1779dc7afa393e3d67dd8e53635513361da3318b3dcbef2978dcdbe3324b14959d500a86878dc40141e4c3d0974b5249234a7994beafa93f6fc04ebef0af4527f295eb3ad82511461662b53618b554c2c8169a789a973c6a9bd81f87bda8974a2c67da93f4cd585fdb78f7065b3e069a1a48cc0f5aef8733aa1ed27a7c662d5c77b614ff28a38acdf"}, &(0x7f00000000c0)=0xb7) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e20, 0x6, @rand_addr="df0ffdafd606a184c26cac67c45cdf32", 0x1ff}}, 0x100000000, 0xa1, 0x401, 0x701, 0x8}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={r2, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x3, 0x4, @empty}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0x2, 0x3, 0x4, 0x5, r3}, &(0x7f0000000300)=0x10) r4 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x2, 0xd65e3730c22f1b40) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f0000000880)={0x5, &(0x7f0000000380)=""/44, &(0x7f0000000800)=[{0x4, 0xe7, 0x63, &(0x7f00000003c0)=""/231}, {0xffffffff, 0x6f, 0x8000, &(0x7f0000000540)=""/111}, {0x2, 0xa1, 0x3, &(0x7f00000005c0)=""/161}, {0x5c8, 0xdf, 0x1, &(0x7f0000000680)=""/223}, {0x2, 0x7c, 0x4d75, &(0x7f0000000780)=""/124}]}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 13:50:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:54 executing program 4: mkdir(&(0x7f0000000040)='./control\x00', 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x200004) move_mount(r0, &(0x7f0000000280)='./control\x00', r0, &(0x7f00000002c0)='./bus/file0\x00', 0x10) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x24040000}, 0x4) statfs(&(0x7f0000000080)='./control\x00', &(0x7f0000002400)=""/4096) [ 1324.539871][T24268] IPVS: ftp: loaded support on port[0] = 21 13:50:55 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000000c000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000440)=""/144) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000340)={0x0, @in, [0x0, 0x0, 0x5, 0x100000001, 0x3, 0x9, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x2]}, &(0x7f0000000700)=0x100) readv(r0, &(0x7f00000018c0), 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) close(r0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x8cffffff00000000) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0xc, {0x8, 0x0, 0x0, 0xb2aa}}) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="2f00000004000000000000000000000005000000000000000300000000000000070000000000000000000000000000c0680f67e01f1a00bb48bdc323e2527701848b2855c8d8a27f56f7480330b3b6a98adfbf40ed14432b68467e2dc3cc14c09e3aaa94e1f7f45587c57884c82815e65a008aa2f5809d2b8df084cce5"], 0x7d) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) 13:50:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xff4d) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 13:50:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080)="528383efc7b25aadaf6ba104cf9fb77c93ee8f55d5701ea321270b0a228078db8be3d3d0b3d98f048925571ff733871e7f05fdba9ecd5810286c3b944116bfaff7421dc222a9c4f0d1b9182173731d4b068a7810363c0de013d0adbf8457909c70a737f64b4effb372045a", 0x6b, 0x9}, {&(0x7f0000000100), 0x0, 0x5}], 0x2000, &(0x7f0000000240)={[{@dir_umask={'dir_umask', 0x3d, 0x80000001}}, {@dir_umask={'dir_umask', 0x3d, 0x3}}, {@file_umask={'file_umask', 0x3d, 0x7}}, {@umask={'umask', 0x3d, 0x6ae}}], [{@euid_gt={'euid>', r1}}]}) 13:50:55 executing program 0: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="b70200000001ff00bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000ff9fa3e42c0c9dd6591d9ba61ee0c2da9a104c71a7a8c3b991b1b6c950e887ad81511e4b16a12835a6600fe3da544353e2c4e6aaf50d29fed83a7a1250ca8cdfe520a1"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1324.917037][T24261] ================================================================== [ 1324.925158][T24261] BUG: KASAN: use-after-free in refcount_inc_not_zero_checked+0x81/0x200 [ 1324.933553][T24261] Read of size 4 at addr ffff888054642b80 by task syz-executor.2/24261 [ 1324.941761][T24261] [ 1324.944076][T24261] CPU: 0 PID: 24261 Comm: syz-executor.2 Not tainted 5.3.0-rc6+ #128 [ 1324.952119][T24261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1324.962154][T24261] Call Trace: [ 1324.965432][T24261] dump_stack+0x172/0x1f0 [ 1324.969748][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1324.975972][T24261] print_address_description.cold+0xd4/0x306 [ 1324.981932][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1324.987979][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1324.994125][T24261] __kasan_report.cold+0x1b/0x36 [ 1324.999050][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1325.005098][T24261] kasan_report+0x12/0x17 [ 1325.009410][T24261] check_memory_region+0x134/0x1a0 [ 1325.014512][T24261] __kasan_check_read+0x11/0x20 [ 1325.019347][T24261] refcount_inc_not_zero_checked+0x81/0x200 [ 1325.025228][T24261] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1325.031017][T24261] ? __kasan_check_write+0x14/0x20 [ 1325.036287][T24261] refcount_inc_checked+0x17/0x70 [ 1325.041383][T24261] nr_release+0x62/0x3e0 [ 1325.048112][T24261] __sock_release+0xce/0x280 [ 1325.052699][T24261] sock_close+0x1e/0x30 [ 1325.056849][T24261] __fput+0x2ff/0x890 [ 1325.060815][T24261] ? __sock_release+0x280/0x280 [ 1325.065644][T24261] ____fput+0x16/0x20 [ 1325.069620][T24261] task_work_run+0x145/0x1c0 [ 1325.074195][T24261] exit_to_usermode_loop+0x316/0x380 [ 1325.079722][T24261] do_syscall_64+0x5a9/0x6a0 [ 1325.084293][T24261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.090174][T24261] RIP: 0033:0x413561 [ 1325.094049][T24261] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1325.113729][T24261] RSP: 002b:00007ffee56bf7b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1325.122209][T24261] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000413561 [ 1325.130160][T24261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1325.138114][T24261] RBP: 0000000000000001 R08: 00000000a30510db R09: 00000000a30510df [ 1325.146064][T24261] R10: 00007ffee56bf890 R11: 0000000000000293 R12: 000000000075c9a0 [ 1325.154013][T24261] R13: 000000000075c9a0 R14: 0000000000761f18 R15: ffffffffffffffff [ 1325.161976][T24261] [ 1325.164292][T24261] Allocated by task 24265: [ 1325.168693][T24261] save_stack+0x23/0x90 [ 1325.172837][T24261] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1325.178445][T24261] kasan_kmalloc+0x9/0x10 [ 1325.182751][T24261] __kmalloc+0x163/0x770 [ 1325.186972][T24261] sk_prot_alloc+0x23a/0x310 [ 1325.191539][T24261] sk_alloc+0x39/0xf70 [ 1325.195587][T24261] nr_create+0xb9/0x5e0 [ 1325.199721][T24261] __sock_create+0x3d8/0x730 [ 1325.204309][T24261] __sys_socket+0x103/0x220 [ 1325.208812][T24261] __x64_sys_socket+0x73/0xb0 [ 1325.213479][T24261] do_syscall_64+0xfd/0x6a0 [ 1325.217961][T24261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.223828][T24261] [ 1325.226138][T24261] Freed by task 24261: [ 1325.230201][T24261] save_stack+0x23/0x90 [ 1325.234349][T24261] __kasan_slab_free+0x102/0x150 [ 1325.239266][T24261] kasan_slab_free+0xe/0x10 [ 1325.243746][T24261] kfree+0x10a/0x2c0 [ 1325.247632][T24261] __sk_destruct+0x4f7/0x6e0 [ 1325.252201][T24261] sk_destruct+0x86/0xa0 [ 1325.256422][T24261] __sk_free+0xfb/0x360 [ 1325.260583][T24261] sk_free+0x42/0x50 [ 1325.264471][T24261] nr_release+0x356/0x3e0 [ 1325.268779][T24261] __sock_release+0xce/0x280 [ 1325.273348][T24261] sock_close+0x1e/0x30 [ 1325.277484][T24261] __fput+0x2ff/0x890 [ 1325.281449][T24261] ____fput+0x16/0x20 [ 1325.285411][T24261] task_work_run+0x145/0x1c0 [ 1325.289996][T24261] exit_to_usermode_loop+0x316/0x380 [ 1325.295274][T24261] do_syscall_64+0x5a9/0x6a0 [ 1325.299848][T24261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.305717][T24261] [ 1325.308030][T24261] The buggy address belongs to the object at ffff888054642b00 [ 1325.308030][T24261] which belongs to the cache kmalloc-2k of size 2048 [ 1325.322063][T24261] The buggy address is located 128 bytes inside of [ 1325.322063][T24261] 2048-byte region [ffff888054642b00, ffff888054643300) [ 1325.335401][T24261] The buggy address belongs to the page: [ 1325.341187][T24261] page:ffffea0001519080 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 compound_mapcount: 0 [ 1325.352184][T24261] flags: 0x1fffc0000010200(slab|head) [ 1325.357542][T24261] raw: 01fffc0000010200 ffffea0002885388 ffffea00013cff08 ffff8880aa400e00 [ 1325.366112][T24261] raw: 0000000000000000 ffff888054642280 0000000100000003 0000000000000000 [ 1325.375201][T24261] page dumped because: kasan: bad access detected [ 1325.381589][T24261] [ 1325.384007][T24261] Memory state around the buggy address: [ 1325.389617][T24261] ffff888054642a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1325.397659][T24261] ffff888054642b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1325.405709][T24261] >ffff888054642b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1325.413759][T24261] ^ [ 1325.417823][T24261] ffff888054642c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1325.425862][T24261] ffff888054642c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1325.433904][T24261] ================================================================== [ 1325.486064][T24261] Kernel panic - not syncing: panic_on_warn set ... [ 1325.492794][T24261] CPU: 0 PID: 24261 Comm: syz-executor.2 Tainted: G B 5.3.0-rc6+ #128 [ 1325.502376][T24261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.512450][T24261] Call Trace: [ 1325.515748][T24261] dump_stack+0x172/0x1f0 [ 1325.520175][T24261] panic+0x2dc/0x755 [ 1325.524082][T24261] ? add_taint.cold+0x16/0x16 [ 1325.528863][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1325.535116][T24261] ? preempt_schedule+0x4b/0x60 [ 1325.539965][T24261] ? ___preempt_schedule+0x16/0x20 [ 1325.545101][T24261] ? trace_hardirqs_on+0x5e/0x240 [ 1325.550384][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1325.556440][T24261] end_report+0x47/0x4f [ 1325.560577][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1325.566631][T24261] __kasan_report.cold+0xe/0x36 [ 1325.571462][T24261] ? refcount_inc_not_zero_checked+0x81/0x200 [ 1325.577513][T24261] kasan_report+0x12/0x17 [ 1325.581834][T24261] check_memory_region+0x134/0x1a0 [ 1325.586936][T24261] __kasan_check_read+0x11/0x20 [ 1325.591782][T24261] refcount_inc_not_zero_checked+0x81/0x200 [ 1325.597664][T24261] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1325.603453][T24261] ? __kasan_check_write+0x14/0x20 [ 1325.608901][T24261] refcount_inc_checked+0x17/0x70 [ 1325.613915][T24261] nr_release+0x62/0x3e0 [ 1325.618144][T24261] __sock_release+0xce/0x280 [ 1325.622714][T24261] sock_close+0x1e/0x30 [ 1325.626853][T24261] __fput+0x2ff/0x890 [ 1325.630817][T24261] ? __sock_release+0x280/0x280 [ 1325.635656][T24261] ____fput+0x16/0x20 [ 1325.639617][T24261] task_work_run+0x145/0x1c0 [ 1325.644191][T24261] exit_to_usermode_loop+0x316/0x380 [ 1325.649469][T24261] do_syscall_64+0x5a9/0x6a0 [ 1325.654050][T24261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.659933][T24261] RIP: 0033:0x413561 [ 1325.663819][T24261] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1325.683501][T24261] RSP: 002b:00007ffee56bf7b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1325.691892][T24261] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000413561 [ 1325.699845][T24261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1325.707884][T24261] RBP: 0000000000000001 R08: 00000000a30510db R09: 00000000a30510df [ 1325.715835][T24261] R10: 00007ffee56bf890 R11: 0000000000000293 R12: 000000000075c9a0 [ 1325.723791][T24261] R13: 000000000075c9a0 R14: 0000000000761f18 R15: ffffffffffffffff [ 1325.733339][T24261] Kernel Offset: disabled [ 1325.737937][T24261] Rebooting in 86400 seconds..