2.684986] bridge0: port 2(bridge_slave_1) entered disabled state [ 1362.708754] device bridge_slave_0 left promiscuous mode [ 1362.714350] bridge0: port 1(bridge_slave_0) entered disabled state [ 1362.821181] team0 (unregistering): Port device team_slave_1 removed [ 1362.839639] team0 (unregistering): Port device team_slave_0 removed [ 1362.880777] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1362.904269] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1362.963135] bond0 (unregistering): Released all slaves [ 1363.346072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1363.353090] bridge0: port 1(bridge_slave_0) entered disabled state [ 1363.367057] device bridge_slave_0 entered promiscuous mode [ 1363.417097] bridge0: port 2(bridge_slave_1) entered blocking state [ 1363.423878] bridge0: port 2(bridge_slave_1) entered disabled state [ 1363.431908] device bridge_slave_1 entered promiscuous mode 18:29:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x71000000]}, 0x2c) [ 1363.482091] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1363.585366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1363.754127] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1363.806128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1363.855645] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1363.862750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1363.914037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1363.921388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1364.072562] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1364.080537] team0: Port device team_slave_0 added [ 1364.129159] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1364.136725] team0: Port device team_slave_1 added [ 1364.186321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1364.238904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1364.289550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1364.296729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1364.314549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1364.364037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1364.371988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1364.390154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1364.914349] bridge0: port 2(bridge_slave_1) entered blocking state [ 1364.920812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1364.927682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1364.934070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1364.942498] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1365.817628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1366.268159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1366.369450] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1366.474403] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1366.480652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1366.489407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1366.591991] 8021q: adding VLAN 0 to HW filter on device team0 18:29:45 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x4, 0x200) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) clock_nanosleep(0x7, 0x1, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100)) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f0000000000)) r1 = socket$unix(0x1, 0x3, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) socket$inet6_udp(0xa, 0x2, 0x0) 18:29:45 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ffb00c"], 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000100)=0x4) close(r1) write$P9_RSTATFS(r1, &(0x7f0000000180)={0x43, 0x9, 0x1, {0xfffffffffffffffa, 0xa00000000, 0x8, 0x8, 0x2, 0x4, 0x1}}, 0x43) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x4) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0xffffffffffffffff, 0x84200}, 0xc) 18:29:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x200000) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) ioctl$int_in(r1, 0x5421, &(0x7f00000000c0)=0xc83) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x66cfda2d, 0x4) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x200, 0x60000) 18:29:45 executing program 1 (fault-call:1 fault-nth:9): r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:45 executing program 0: unshare(0x800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) tee(r0, r0, 0x8000, 0xb) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x36e]}, 0x2c) 18:29:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x8201000000000000]}, 0x2c) [ 1367.254887] FAULT_INJECTION: forcing a failure. [ 1367.254887] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.337508] CPU: 1 PID: 31422 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #265 [ 1367.344927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.354306] Call Trace: [ 1367.356924] dump_stack+0x244/0x39d [ 1367.360588] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1367.365806] ? debug_smp_processor_id+0x1c/0x20 [ 1367.370493] ? perf_trace_lock+0x14d/0x7a0 [ 1367.375087] should_fail.cold.4+0xa/0x17 [ 1367.379164] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1367.379192] ? save_stack+0x43/0xd0 [ 1367.379207] ? kasan_kmalloc+0xc7/0xe0 [ 1367.379221] ? __kmalloc+0x15b/0x760 [ 1367.379242] ? snd_pcm_plugin_build+0x64/0x670 [ 1367.400144] ? snd_pcm_plugin_build_linear+0x2b9/0x920 [ 1367.405444] ? zap_class+0x640/0x640 [ 1367.409179] ? snd_pcm_oss_make_ready+0xbe/0x170 [ 1367.413962] ? snd_pcm_oss_ioctl+0x25ca/0x3ed0 [ 1367.418565] ? snd_pcm_oss_ioctl_compat+0x24/0x30 [ 1367.423423] ? __ia32_compat_sys_ioctl+0x20e/0x630 [ 1367.428392] ? do_fast_syscall_32+0x34d/0xfb2 [ 1367.432919] ? entry_SYSENTER_compat+0x70/0x7f [ 1367.437524] ? find_held_lock+0x36/0x1c0 [ 1367.441614] ? __lock_is_held+0xb5/0x140 [ 1367.445713] ? perf_trace_sched_process_exec+0x860/0x860 [ 1367.451195] __should_failslab+0x124/0x180 [ 1367.455451] should_failslab+0x9/0x14 [ 1367.459283] __kmalloc+0x2e0/0x760 [ 1367.462849] ? snd_pcm_plugin_build+0x448/0x670 [ 1367.467544] snd_pcm_plugin_build+0x448/0x670 [ 1367.472073] snd_pcm_plugin_build_linear+0x2b9/0x920 [ 1367.477209] ? linear_transfer+0xa30/0xa30 [ 1367.481473] ? snd_pcm_hw_param_first+0x323/0x6f0 [ 1367.486341] snd_pcm_plug_format_plugins+0x7e2/0x1a80 [ 1367.491552] ? snd_pcm_plug_slave_format+0x780/0x780 [ 1367.496689] ? snd_interval_refine+0x428/0x700 [ 1367.501306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1367.506869] ? snd_pcm_hw_param_max+0x720/0x720 [ 1367.511559] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1367.516777] snd_pcm_oss_change_params_locked+0x118b/0x3c60 [ 1367.522523] ? mark_held_locks+0x130/0x130 [ 1367.526799] ? snd_pcm_hw_param_near.constprop.34+0xb30/0xb30 [ 1367.532704] ? debug_smp_processor_id+0x1c/0x20 [ 1367.537390] ? perf_trace_lock+0x14d/0x7a0 [ 1367.541643] ? mark_held_locks+0x130/0x130 [ 1367.545886] ? lock_is_held_type+0x210/0x210 [ 1367.550317] ? lock_is_held_type+0x210/0x210 [ 1367.554747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1367.560314] ? check_preemption_disabled+0x48/0x280 [ 1367.565349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1367.570909] ? zap_class+0x640/0x640 [ 1367.574641] ? debug_smp_processor_id+0x1c/0x20 [ 1367.579327] ? perf_trace_lock+0x14d/0x7a0 [ 1367.583613] snd_pcm_oss_change_params+0x80/0xe0 [ 1367.588390] snd_pcm_oss_make_ready+0xbe/0x170 [ 1367.592994] snd_pcm_oss_set_trigger.isra.25+0x8a/0x8e0 [ 1367.598389] ? find_held_lock+0x36/0x1c0 [ 1367.602484] ? snd_pcm_oss_make_ready+0x170/0x170 [ 1367.607373] snd_pcm_oss_ioctl+0x25ca/0x3ed0 [ 1367.611809] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1367.616766] ? kasan_check_read+0x11/0x20 [ 1367.620936] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1367.626287] ? snd_pcm_oss_release+0x290/0x290 [ 1367.630902] ? __fget+0x4d1/0x740 [ 1367.634381] ? ksys_dup3+0x680/0x680 [ 1367.638120] ? find_held_lock+0x36/0x1c0 [ 1367.642210] ? kasan_check_write+0x14/0x20 [ 1367.646460] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1367.651407] ? wait_for_completion+0x8a0/0x8a0 [ 1367.656036] ? __fget_light+0x2e9/0x430 [ 1367.660057] ? fget_raw+0x20/0x20 [ 1367.663534] ? __sb_end_write+0xd9/0x110 [ 1367.667632] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1367.673190] ? fput+0x130/0x1a0 [ 1367.676490] ? do_fast_syscall_32+0x150/0xfb2 [ 1367.681002] ? do_fast_syscall_32+0x150/0xfb2 [ 1367.685523] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1367.690143] ? snd_pcm_oss_ioctl+0x3ed0/0x3ed0 [ 1367.694765] snd_pcm_oss_ioctl_compat+0x24/0x30 [ 1367.699464] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1367.704248] do_fast_syscall_32+0x34d/0xfb2 [ 1367.708597] ? do_int80_syscall_32+0x890/0x890 [ 1367.713195] ? entry_SYSENTER_compat+0x68/0x7f [ 1367.717800] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1367.722833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1367.727690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1367.732547] ? trace_hardirqs_on_caller+0x310/0x310 [ 1367.732566] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1367.732585] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1367.732608] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1367.747665] entry_SYSENTER_compat+0x70/0x7f [ 1367.747680] RIP: 0023:0xf7f41a29 [ 1367.747698] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1367.747707] RSP: 002b:00000000f5f3d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 18:29:46 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="37621b2704c2bee726f8f19b85549946322a662eb6c3c138b18627fae9517fdb5bc8e89f474788a8e7e0b2cd5bd69bd98f2b247ebe6b5c0c86601563fcb2dada76a9558124515e80488d862709f600577542604dc57b71c7a8d4fd9799cb2bde2ba19a5f07469f53a1e707ec6a00779326"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:46 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ff80b3e741b3270e574e6da87e27d0dec2dc"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(r0, r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:46 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x694fb3c910f42888, &(0x7f0000000040)=0x6) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x9, 0x4, 0x1, 0x6e1, 0x4, 0x100}) sendto$inet6(r0, &(0x7f0000000080)="b8e27c45fddb0bf247d990555c4eb82c3f27def35f36b08d6a7ce2187eebcd56c790a6cfa5c4d10dc7d71002f61498f601a5f85e8afb257a", 0x38, 0x11, &(0x7f00000000c0)={0xa, 0x4e24, 0x9, @mcast2, 0x4}, 0x1c) ioctl$RTC_PIE_OFF(r0, 0x7006) 18:29:46 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0xb) [ 1367.747728] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000040045010 [ 1367.794219] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 1367.801508] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1367.808796] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1367.816115] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:29:46 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3ec, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b000000050000004006000010040000400100001004000010040000dc020000740500007405000074050000740500007405000005000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x69c) unlinkat(r0, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$int_in(r0, 0x800040c0045009, &(0x7f0000000040)=0x7) 18:29:46 executing program 1 (fault-call:1 fault-nth:10): r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x8000000]}, 0x2c) 18:29:46 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x84200}, 0xfa) 18:29:46 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/137, 0x89}], 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) [ 1368.027776] FAULT_INJECTION: forcing a failure. [ 1368.027776] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.074571] CPU: 0 PID: 31468 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #265 [ 1368.081984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.091348] Call Trace: [ 1368.093956] dump_stack+0x244/0x39d [ 1368.097612] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1368.102830] ? debug_smp_processor_id+0x1c/0x20 [ 1368.107517] ? perf_trace_lock+0x14d/0x7a0 [ 1368.111787] should_fail.cold.4+0xa/0x17 [ 1368.115875] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1368.121009] ? zap_class+0x640/0x640 [ 1368.124756] ? find_held_lock+0x36/0x1c0 [ 1368.128837] ? __lock_is_held+0xb5/0x140 [ 1368.132909] ? mwifiex_ret_802_11_scan_ext+0xc58/0x11a0 [ 1368.138324] ? snd_pcm_plugin_build+0x448/0x670 [ 1368.143009] ? perf_trace_sched_process_exec+0x860/0x860 [ 1368.148524] __should_failslab+0x124/0x180 [ 1368.152799] should_failslab+0x9/0x14 [ 1368.156614] __kmalloc+0x2e0/0x760 [ 1368.160191] ? snd_pcm_hw_param_first+0x323/0x6f0 [ 1368.165053] ? snd_pcm_plugin_build+0x64/0x670 [ 1368.169672] snd_pcm_plugin_build+0x64/0x670 [ 1368.174096] snd_pcm_plugin_build_io+0x295/0x740 [ 1368.178884] ? io_playback_transfer+0x310/0x310 [ 1368.183584] ? snd_pcm_hw_param_max+0x720/0x720 [ 1368.188292] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1368.193528] snd_pcm_oss_change_params_locked+0x1215/0x3c60 [ 1368.199283] ? mark_held_locks+0x130/0x130 [ 1368.203570] ? snd_pcm_hw_param_near.constprop.34+0xb30/0xb30 [ 1368.209477] ? debug_smp_processor_id+0x1c/0x20 [ 1368.214165] ? perf_trace_lock+0x14d/0x7a0 [ 1368.218412] ? mark_held_locks+0x130/0x130 [ 1368.218428] ? lock_is_held_type+0x210/0x210 [ 1368.218450] ? lock_is_held_type+0x210/0x210 [ 1368.218470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1368.218489] ? check_preemption_disabled+0x48/0x280 [ 1368.218510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1368.227153] ? zap_class+0x640/0x640 [ 1368.227176] ? debug_smp_processor_id+0x1c/0x20 [ 1368.227191] ? perf_trace_lock+0x14d/0x7a0 [ 1368.227240] snd_pcm_oss_change_params+0x80/0xe0 [ 1368.227260] snd_pcm_oss_make_ready+0xbe/0x170 [ 1368.227292] snd_pcm_oss_set_trigger.isra.25+0x8a/0x8e0 [ 1368.227311] ? find_held_lock+0x36/0x1c0 [ 1368.227331] ? snd_pcm_oss_make_ready+0x170/0x170 [ 1368.227363] snd_pcm_oss_ioctl+0x25ca/0x3ed0 [ 1368.227381] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1368.227398] ? kasan_check_read+0x11/0x20 [ 1368.227414] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1368.227432] ? snd_pcm_oss_release+0x290/0x290 [ 1368.227462] ? __fget+0x4d1/0x740 [ 1368.237401] ? ksys_dup3+0x680/0x680 [ 1368.237417] ? find_held_lock+0x36/0x1c0 [ 1368.237441] ? kasan_check_write+0x14/0x20 [ 1368.237457] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1368.237479] ? wait_for_completion+0x8a0/0x8a0 [ 1368.237512] ? __fget_light+0x2e9/0x430 [ 1368.237530] ? fget_raw+0x20/0x20 [ 1368.237558] ? __sb_end_write+0xd9/0x110 [ 1368.237582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1368.237599] ? fput+0x130/0x1a0 [ 1368.237618] ? do_fast_syscall_32+0x150/0xfb2 [ 1368.237643] ? do_fast_syscall_32+0x150/0xfb2 [ 1368.256583] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1368.270145] ? snd_pcm_oss_ioctl+0x3ed0/0x3ed0 [ 1368.270162] snd_pcm_oss_ioctl_compat+0x24/0x30 [ 1368.270185] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1368.279614] do_fast_syscall_32+0x34d/0xfb2 [ 1368.344143] ? do_int80_syscall_32+0x890/0x890 [ 1368.344165] ? entry_SYSENTER_compat+0x68/0x7f [ 1368.344186] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1368.344204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1368.344220] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1368.344241] ? trace_hardirqs_on_caller+0x310/0x310 [ 1368.362043] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1368.362063] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1368.362087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1368.362115] entry_SYSENTER_compat+0x70/0x7f [ 1368.362129] RIP: 0023:0xf7f41a29 [ 1368.362147] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1368.362156] RSP: 002b:00000000f5f3d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1368.394201] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000040045010 18:29:47 executing program 0: unshare(0x10006c040007) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:47 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800040c004501a, &(0x7f0000000080)) 18:29:47 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000200)='/dev/dsp#\x00'}, 0x30) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000100)="5818d9c547094aebce1813b2e4b61c3d18a525aa0da53233d03231ccb2d52a564a1315179bd96b0a5b60710efb78f7217738126c34bb1ae40d8b94125127d2c502ac21e6a09d560efd0c61e417d110b5f41d0218f7901f1ed8909da7ba8ebe6e6f303fda63bbe6a9025b7759b352e4f979c4c51d6b99cda4efabf2494fc7cb1407d009b69f81e3e5c4b228377aeae4fc2a367dec26ca50158954540a01efe8d0180b82cba4e821", 0xa7}], 0x1, &(0x7f0000000300)=[@cred={0x18, 0x1, 0x2, r1, r2, r3}], 0x18, 0x1}, 0x8000) 18:29:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x1202]}, 0x2c) 18:29:47 executing program 1 (fault-call:1 fault-nth:11): r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) [ 1368.394212] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 1368.394221] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1368.394231] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1368.394241] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:29:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0xf00]}, 0x2c) 18:29:47 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYRES32=r0], 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) mq_notify(r0, &(0x7f0000000140)={0x0, 0x11, 0x0, @tid=r1}) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:47 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) socketpair(0xa, 0x5, 0x0, &(0x7f0000000080)) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:47 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800040c0045009, &(0x7f0000000040)=0x7) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x7187008be8177da9) 18:29:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0xd0]}, 0x2c) 18:29:47 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x22400, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:47 executing program 3: 18:29:47 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x0, 0x88000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x5, 0xffff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r1, 0xfe}, &(0x7f00000001c0)=0x8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x4a02000000000000]}, 0x2c) 18:29:47 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:47 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x47feb3fe6a504fd3) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0980"], 0x2) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r5, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r5, 0x3) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r6, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0x20000000004}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e23, @local}], 0x10) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000080)=""/64) bind$netlink(r4, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:47 executing program 3: 18:29:47 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x100000000, 0x631, 0x6, 0x5}) 18:29:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x4000000000000]}, 0x2c) 18:29:48 executing program 3: 18:29:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0xa400000000000000]}, 0x2c) [ 1369.452851] IPVS: ftp: loaded support on port[0] = 21 18:29:48 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000408004500b, &(0x7f0000000040)=0x7) 18:29:48 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl(r0, 0x101, &(0x7f0000000080)="e5f700fd3886edc4b3dd1a542551710849c15ef165b48a4ed90d9a1b") 18:29:48 executing program 3: 18:29:48 executing program 2: memfd_create(&(0x7f00000000c0)='/em1&\x00', 0x7) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x208000, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x90000) 18:29:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x9a020000]}, 0x2c) 18:29:48 executing program 3: 18:29:48 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="cfbf"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = geteuid() r3 = getegid() fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r3, 0x1800) r4 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:48 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c020660b, &(0x7f0000000040)=0x7) 18:29:48 executing program 3: 18:29:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0xa4000000]}, 0x2c) 18:29:48 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005450, &(0x7f0000000040)=0x7) [ 1370.105199] IPVS: ftp: loaded support on port[0] = 21 18:29:48 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ffb00c"], 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000100)=0x4) close(r1) write$P9_RSTATFS(r1, &(0x7f0000000180)={0x43, 0x9, 0x1, {0xfffffffffffffffa, 0xa00000000, 0x8, 0x8, 0x2, 0x4, 0x1}}, 0x43) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x4) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0xffffffffffffffff, 0x84200}, 0xc) 18:29:48 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x2, 0x80}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x4fe}, 0x8) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000140)) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000240)={0x7fff, 0x2, 0x5, 'queue1\x00', 0x4}) connect$vsock_dgram(r0, &(0x7f0000000180)={0x28, 0x0, 0x2711, @reserved}, 0x10) 18:29:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0xf8020000]}, 0x2c) 18:29:49 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ff805b0c1abd5e2461b3b83b8497b7fb703ab9d5866c0553b9a7e6b91190d3143fdfbc99097c484093d8d33b49cad6f2b989e7251bc0910d9aa4fab4d12b4eecc45df69b128e2d076bc36191390050ce1e6747f8de4c3fa2d664c6b30e097b4459957306d430a1ffb6bfd56e57747cd72f1ac076d77477081eb8111121b16195cab97e6415d8c10e27b05b822920a66a89a23ac8fafbbe46761db61a5b4a48e09b50e29be5c4bcc801bbd651ce5945c5cf2a835729e0086b5cf683392be175"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:49 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005001, &(0x7f0000000040)=0x7) 18:29:49 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x8300, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000004c0)=""/4096) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[], 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000100)={@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}, {&(0x7f0000000200)=""/7, 0x7}, &(0x7f00000001c0), 0x1}, 0x416bec40ac2d1b0b) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:49 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x100, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/255) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in6={0xa, 0x4e22, 0x9, @loopback, 0x400}}}, 0x90) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x6803]}, 0x2c) 18:29:49 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x62d59ea2, 0x400000) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) open_by_handle_at(r0, &(0x7f0000000280)={0x41, 0xac8, "75b45ad02a7d45101579e610e1aa792d6b5b4cd50db5bb2f3c179d06726cd74a3869ab61ece454e7a466e70a643244277acc5ce3db57183ba8"}, 0x101000) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x100000000, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000300)={'team0\x00', r2}) connect(r0, &(0x7f0000000200)=@ll={0x11, 0x18, r2, 0x1, 0x8, 0x6, @dev={[], 0x1b}}, 0x80) 18:29:49 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080044df9, &(0x7f0000000040)=0x7) 18:29:49 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ff805b0c1abd5e2461b3b83b8497b7fb703ab9d5866c0553b9a7e6b91190d3143fdfbc99097c484093d8d33b49cad6f2b989e7251bc0910d9aa4fab4d12b4eecc45df69b128e2d076bc36191390050ce1e6747f8de4c3fa2d664c6b30e097b4459957306d430a1ffb6bfd56e57747cd72f1ac076d77477081eb8111121b16195cab97e6415d8c10e27b05b822920a66a89a23ac8fafbbe46761db61a5b4a48e09b50e29be5c4bcc801bbd651ce5945c5cf2a835729e0086b5cf683392be175"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:49 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) dup3(r0, r0, 0x80000) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x20000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x800) write$P9_RLERRORu(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="0000e10766c5e2aca6b725c93f1a9cfdd5dc9a1b05f3935bea06f8b9aad1f8d8c76003994a7a94c8548945ed3d8b0fd9477d7aec89f52614ba9ec5d1e864"], 0x2) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x200, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000000c0)={r3}) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) shutdown(r2, 0x1) 18:29:49 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x94) name_to_handle_at(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=ANY=[], &(0x7f0000000180), 0x3fd) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r3 = dup3(r1, r1, 0x80000) r4 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x402000) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000200)={0xd000, &(0x7f0000000100), 0x6, r4, 0x1}) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x15]}, 0x2c) [ 1371.217682] IPVS: ftp: loaded support on port[0] = 21 18:29:49 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000404004500b, &(0x7f0000000040)=0x7) 18:29:49 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl(r0, 0x7, &(0x7f0000000080)) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x2ca]}, 0x2c) 18:29:50 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ff805b0c1abd5e2461b3b83b8497b7fb703ab9d5866c0553b9a7e6b91190d3143fdfbc99097c484093d8d33b49cad6f2b989e7251bc0910d9aa4fab4d12b4eecc45df69b128e2d076bc36191390050ce1e6747f8de4c3fa2d664c6b30e097b4459957306d430a1ffb6bfd56e57747cd72f1ac076d77477081eb8111121b16195cab97e6415d8c10e27b05b822920a66a89a23ac8fafbbe46761db61a5b4a48e09b50e29be5c4bcc801bbd651ce5945c5cf2a835729e0086b5cf683392be175"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:50 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040800c5011, &(0x7f0000000040)=0x7) 18:29:50 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x4200, 0x1) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x401, 0x80000001, 0x7a15c4f3, 0x9d, 0x800}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x1000, 0x208, 0x2347b502, 0x1, r2}, &(0x7f00000001c0)=0x10) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x48200, 0x0) 18:29:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x32]}, 0x2c) 18:29:50 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005452, &(0x7f0000000040)=0x7) 18:29:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x7100000000000000]}, 0x2c) 18:29:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:51 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x3ff, 0x161400) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x5a, 0x101000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x9e, "8f2954ef84f81c3176283140c01702a950079c6c10ad6da964635fc307716552fde30534199ca761452a5585c2e14d4f70c8a072c42d0e05b89d6eec8ae8acaf4ebe3b790658b037ffefcb74c9fa5771b5cb2b1318094a4825bb5087fe3e33fa58d42770191ef4b7d5f03b9c493c5b0ebf0da0de89d68190edc91dd206b6d5e822d2b61e3a305f830025e19b9c053ec48f5c7f292610bf7fa713a50ae0fe"}, &(0x7f00000000c0)=0xa6) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x6}, 0x8) ioctl$TIOCCBRK(r1, 0x5428) 18:29:51 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000080)) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x1403000000000000]}, 0x2c) 18:29:51 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) r1 = add_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="eecf01e916fb35464e5ca1f3293bd321b229ca889398947fbe90f301ef0b307ffd5dd6117440bb424ae1bb138a22a1a2db441cd4f7c41109d5", 0x39, 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000300)='.dead\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='/dev/vhci\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x8, r2) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x200, 0x7}, &(0x7f0000000080)=0x88) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r5}, &(0x7f0000000200)=0x8) 18:29:51 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005421, &(0x7f0000000040)=0x7) 18:29:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0xca02000000000000]}, 0x2c) [ 1372.615399] IPVS: ftp: loaded support on port[0] = 21 18:29:51 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080045002, &(0x7f0000000040)=0x7) 18:29:51 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x5, 0x4) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x7a6, 0x4) 18:29:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x1402000000000000]}, 0x2c) 18:29:51 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x22002, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000180)={0x2, 0x53, 0x5, 0x0, 0x6, 0x4, 0x8, 0x8000, 0x7f, 0x9, 0x7, 0x4, 0x0, 0xffffffffffff8001, 0x3, 0xffffffffffffffff, 0x2000000000000000, 0xe209}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="7abe30c0d0ac420924e1fd4048c65ff8910f627042f93605a413e264be30"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5e7, 0x800) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f00000000c0)) timer_create(0x4, &(0x7f0000000640)={0x0, 0x39, 0x1}, &(0x7f0000000680)=0x0) timer_getoverrun(r2) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000240)={0x3, 0x1000}) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RSTAT(r0, &(0x7f00000001c0)={0x5b, 0x7d, 0x2, {0x0, 0x54, 0x80, 0x100000000, {0x80, 0x3, 0x8}, 0x20100000, 0x6, 0x100000001, 0x3, 0x0, "", 0x1, '{', 0x11, '/dev/dlm-monitor\x00', 0xf, 'trustedusereth1'}}, 0x5b) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$P9_RATTACH(r3, &(0x7f0000000580)={0x14, 0x69, 0x2, {0x10, 0x4, 0x2}}, 0x14) r4 = add_key(&(0x7f0000000300)='.dead\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000500)="9b979bfa7328d169bc3a02f29dcf31dbc736b89ae7af80ea2f919d1c9563cc6d3c34833144b176279357c272f5371e703dcd16a49787e9be015732323b81c39166e30c62768384b355bc70f0c16c7c027b2e1083f987e9e8d0475af24b74d8d1c4553a7dcba426922ba9146aa13c560440", 0x71, 0xfffffffffffffffb) add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000380)="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", 0xfc, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) write$P9_RWALK(r1, &(0x7f0000000080)={0x23, 0x6f, 0x2, {0x2, [{0xc3fcc7b4f05dc31b, 0x4, 0x6}, {0x20, 0x3, 0x3}]}}, 0x23) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r3, 0x4) bind$netlink(r5, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x3b4]}, 0x2c) 18:29:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 1373.315434] IPVS: ftp: loaded support on port[0] = 21 18:29:52 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:52 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @local}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0xffff, 0xf06b7de73783e790}, 0xc) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffc01, 0x680903) 18:29:52 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0045006, &(0x7f0000000040)=0x7) 18:29:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xba02000000000000]}, 0x2c) 18:29:52 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x80000001, 0x40000) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000100)={0x7fffffff, {0x4, 0x185, 0x9, 0xd9c4, 0x5, 0x4}}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x82010000]}, 0x2c) 18:29:52 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040800c5012, &(0x7f0000000040)=0x7) 18:29:52 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) [ 1373.731804] IPVS: ftp: loaded support on port[0] = 21 18:29:52 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0x400000) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0600"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:29:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x40000000]}, 0x2c) 18:29:52 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000000002, &(0x7f0000000040)=0x7) [ 1375.162697] bridge0: port 1(bridge_slave_0) entered blocking state [ 1375.169224] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.176246] device bridge_slave_0 entered promiscuous mode [ 1375.206814] bridge0: port 2(bridge_slave_1) entered blocking state [ 1375.213341] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.220714] device bridge_slave_1 entered promiscuous mode [ 1375.250914] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1375.280537] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1375.386908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1375.434210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1375.620675] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1375.628328] team0: Port device team_slave_0 added [ 1375.657083] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1375.664808] team0: Port device team_slave_1 added [ 1375.708515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1375.754341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1375.785699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1375.830281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1375.928506] device bridge_slave_1 left promiscuous mode [ 1375.934071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.942981] device bridge_slave_0 left promiscuous mode [ 1375.949094] bridge0: port 1(bridge_slave_0) entered disabled state [ 1375.958540] device bridge_slave_1 left promiscuous mode [ 1375.964036] bridge0: port 2(bridge_slave_1) entered disabled state [ 1375.972156] device bridge_slave_0 left promiscuous mode [ 1375.977959] bridge0: port 1(bridge_slave_0) entered disabled state [ 1376.024832] team0 (unregistering): Port device team_slave_1 removed [ 1376.035350] team0 (unregistering): Port device team_slave_0 removed [ 1376.046210] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1376.060324] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1376.090118] bond0 (unregistering): Released all slaves [ 1376.113315] team0 (unregistering): Port device team_slave_1 removed [ 1376.125407] team0 (unregistering): Port device team_slave_0 removed [ 1376.135977] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1376.150247] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1376.188063] bond0 (unregistering): Released all slaves [ 1376.585800] bridge0: port 2(bridge_slave_1) entered blocking state [ 1376.592410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1376.599157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1376.605545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1376.614005] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1376.937889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1378.466201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1378.571579] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1378.671678] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1378.678130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1378.685170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1378.786705] 8021q: adding VLAN 0 to HW filter on device team0 [ 1379.392987] IPVS: ftp: loaded support on port[0] = 21 18:29:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:58 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:29:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xdc03]}, 0x2c) 18:29:58 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040402c582a, &(0x7f0000000040)=0x7) 18:29:58 executing program 0: unshare(0x6c060000) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x2, 0x8, 0x9, 0x9, 0x3, 0x0, 0x297, 0x55, 0x38, 0x233, 0x200, 0x10001, 0x20, 0x2, 0x8, 0x7, 0x6}, [{0x5, 0x9, 0x3, 0x7, 0xffffffffffff804e, 0xc37, 0x1206bc91, 0x8}], "0eeb0ae7a3c698a610de24b90f6b5fcbf8d92c6adf6820146d29a960d769b0322af74409011ea8b3", [[], [], [], [], []]}, 0x580) mmap(&(0x7f000091e000/0x2000)=nil, 0x2000, 0x2000002, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x1000000000000003, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:29:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3c6]}, 0x2c) [ 1379.652448] IPVS: ftp: loaded support on port[0] = 21 18:29:58 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045013, &(0x7f0000000040)=0x7) 18:29:58 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e22, 0xb9c, @remote, 0x6}}, 0x8000, 0x7, 0x200, "f6a6a8f0e8bdcfb1968495f06c4b4d86072677fd84e88c3bd5b4d53c9d99e257123036bcd9d9b8a3d9f6ad73ef9863b9352809985a209e95a338eadd2c8e5cbabf2609939f68f9412afbcd4b9450af26"}, 0xd8) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000200)=[@timestamp, @timestamp, @sack_perm, @sack_perm, @mss={0x2, 0x47}, @mss={0x2, 0x2}, @timestamp], 0x7) [ 1379.746931] IPVS: ftp: loaded support on port[0] = 21 18:29:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xec03000000000000]}, 0x2c) 18:30:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8000000000000]}, 0x2c) 18:30:02 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080045017, &(0x7f0000000040)=0x7) 18:30:02 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, &(0x7f00000000c0)={0x0, 0x9, 0x81}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:02 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:02 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000001640)=0x0) getresuid(&(0x7f0000001680), &(0x7f00000016c0)=0x0, &(0x7f0000001700)) r6 = getegid() sendmsg$unix(r2, &(0x7f0000001780)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000004c0)="0dd0d0bc363b98c08478dccd58a8c2c0585451ef9a5c33df8e168c79fa8cd0eb631763de9a24842c1ac418659621060462a9c17a2d7ea0faedeb3d3c1491174f12740a4b04beb70a6dbb50919eb8d0b4c42d67da84a03560d0624b2c0cd1be5f4f6c3721fc458ca63626989ea3a606d591d1e6264b6e8c215d859b58360b8d8950673dd68c87a9afb8739d2933fd92a068d098d59d57a8a2843154ea9020fa13ccf8d769e2b4ad1463c369f4903fee0411ef36ad7927e73b110c8a7e379b76db886da40b580e8647f5669094d3f5660b37318202befa5f595f7d6bd322ebdc5897851c5b8cb980e0cd33308f7949a4c3e8210515d4c4a4933ef038f987a69b10f5966c1baed3aad9b52a7936206e5798950207ef2d7408af641c00c68b5a00f4f294d61580013f4041049a102c504840db2484dfe1165295af134b024d676960f7ae1e994bf2d4da77b88f64cf3f3b2bbab4b1604f45cb53c1eb81eff18b4b5ea4a1409bd22bdfa7eb4289c32f0c715d15fd442ec10bae7aa01d88265d4ead0065e58221067281f2b14852d9279c338237780a8d38782eedc61edbfd6c49d00c5f99906881df60cd8381729cb0f0188c222e69196218ba522746282725f8ca43749efbe26493d52b4d1bf471319c6abf87d65e3d19577d6341c4fd2489b2fb7ae80c7df073dee8630b7f1d3cdca55ec1e9c0bdfb7aba53e918f8eaa590e8b639e7b294c123b145bcfa2aa23ccf79a5906bf73d545766de8de7b52d483acbdb285c6f52a88f60819f52d2f131de6fcd23e80baef4fec5d4ff480014277bed45cd76be1d804dbcb95b1d29b0c30bc13f6a6946efb40fa175baa237b16b63a56249fb8a70e79ce80550cc9eb8da98b44ba3b2f591dbf8060b6dbe78bb8450fff7d47578dbde524637c83fb8821e48635310a9265fb0a0a76c6edeee85666b3eec45f742c30f4cef829ca816b079b63dfe9539c7731409b73f3130cead7e6d6f5067f85a4f665eeebff178bfe5cbce2bce5b155ac44750f0b532b1e8742a7dbf26ba27c5acebc4c30735d7dfee30221b53634b80e21b471b806c956069ae5cd7b82ab9c0299fb028cfb7ac82ed7ae47fedc7291e5f0ee90aec56c984a9d9d845552dfd10029563ddaed3f3774a013ea1d6125ade7110a3eebae11cbda5141cbbc764a804663aae7fa6a13279908d711fb12eee7cd3f245f14ff74c5622376aa6d13501d6629e88b97a2be51c6ed2d9bb3df74c037a9d5ba5986a6ccc64433498a93e38890a12dd38464d725889e7d49840d3f8fa58bcf5a5dce7dc8abad085b1c34abfc8c0aba27582e3266e5255a6a66aa6faa8a31354174344872a06a205019ba2377a634540e85e2b73b992dd8bdfcd65643d8811710d695f0e01e642197c2c3340987ccab9d1e3667b03c29bc7b0415d323253e564f3b0cd54b2dc5a7af328b2fddbe964faa8e903ee07fd1a9e7563db5923d98bb86a7af6fed4aa1373aec361652400c3a1bf363a72bdf6db764204dd045c4d1cece040f098f09cd3b3391cbf1fd8cfe4ef8c52c6603afa82b97a7cb1246500e0f50269bf9a1d1e2176285999e0833ef6a38aae4922ee93f1b00f373d2c3e2ab905664661e11365a99db4e399679fac09fedd45ea3d5efe42b301bc9149e67e09d7b1378e4d868004d51a66b791167ba578ae01f9108c4ec691c51c2c91ae7dcf4d1830241ad8d9b6fa08f066316a8f3ffb5a670fe240059f5651a54e98c8565b4b4c561ca42e3ee2dd82b443dd401bdb58a9d6a817911f2ea56c8dd55aa0481d722640c25401692ddab3f6389ff641a0d4e69059e4052c92977888627a70f0f21b3ad919d29b866b8aeedc5c35a9893879785bf3b6e3a0793f4109d8bc2a6c51b456f2e722e6e8749a9cfc2ba3b04711dff31617cf8621beef069d673f01f3160070f9e827cae8565972a536714d05b009c5ba1641879703a063ef82b73f9128018fe077ceccc86b36063d344d2fd38d97b33a3ad92b14a44a74c73e78d8b04ff8b9be62a8e3721afe7b666496af212c897e526908de14f124864854336508c096c8a64d5033c3b96d63fa1d02f34d0589c743154188aab37138003c69ab08ebe593c5d4dc46833a38ff8fddd7a3da33949299c8752d16127b1d56ad3d35fd10803490b233d262a5df69b74c9e1a4bea93f40a6730a75710d4455af0e0430996b7172a1884eaa73193331bc0ddddb631db7a664cd36479114a57534199bebafb46e3d76af49c26b9f66b754a7039f5262398bc6deae582af24dcfa2f5df796ac0490c16acaabe19bb118b99a432966eebeea73e7ef24e487cbbc4dfe594bd9be1a83bcb8eaeb9a0bb164c555a7b80333e737ca5335c4a83eae3be341909a4cc06ed8a3d22a75ffc7de6733e61647bd9fdb4a7f1f9ca2652c957a2c8aca9690172ff23dec8726ff8a1a7d1f29d8725bab4a4411c93ce32474c9a4a0275c2dad526cd0292429a732476855d167db15b406c92b7e0232da89373bf490d9c355acb2e4cc21e74ef632eb2de1d4e7c3b8db76bf822ea13f8198f36afb9648fb1bea9803c419243f0a5d5118c4ab8b5a708304f01f270d58898afe823981b3883339027d32960a7b11475694ff9a3182b49913a41d8beffc14cbcb268341cfeab957674c635a116f54125c631b159a259f976a9295e9a570f63e79143a7a340b341c812898034682768f6f75a81882a7e38453367677729c8b65d94cbb3d81801309b889da1eec391d3942dbaa6786f2d8ac2bb485f072584c33eece7bcf73e80a5ebd0fd432a6e985f9bf9e3bb19dd8d04699dce9087e741e29a0ed0900d769699b5d3b2bbcdf96044e5b7a06d9ee5630bb4505a60a03503d4b7cbb2f934a408c65adbf888d27e5a5f587b2a2592689e5823530373529c562e857717636084ccc78713e66cf7ed4023b05566419993c4820736046d95aade9bdcf8a19011536635c6898b5f40353dcc3c2fd121658566266cd9417fa0c389124c274eaacd8667fc51a4834d0bec15eb9aa35ddcfdfea35a3ea5b56ca8bb8c664e6a1bd0bf5dd2e354f82bdad6e901827d2ac2ffa5711c166f7fb8ee5d7aafc88dac7c9e9b24062dfca360ee06c0fc2455b44c205aebb763a2c50464709d2bbcc5d1fd6dac57e8884b1bc75f0ba1e3ae7e5068816139c4ef81da783bc22cbce0cc57ceb390be8b28f601d98a2f36a0f2adb04b25fa78f6c9d8294057ef1a43e43fc965d486a89a2f02a1da97835784f0529e3ee16aa92fd2c41f73fa82ac94bd18b02de2d23bd19fcb1276d23bd50c4ed02d5919f0e7ba878c3b64f300c61f87604aaf78c75c6ea9a8c448a6b0302df3125245c81dc2aeb69259317b826dedd13ffb68eebdaad02154b99b5fe49026a7c52a449d2709042f5859c77d60f405a5123a6cb25cbfad4cea7ae757b099616187dab4d4866666033256fa9ca05f71a16aa0b2de2838a4bc4e429929960e9f2531cd962fa6b66da7583e8c2fddc80da8e6bde8592ef6712dd8790ab58b75de4182f783470ff6415f31746a61b60b15db3fc2081bc2247b8d020b5abc93e985a3e826d956ee1ee6d05c6d7940b3e7ecfe877974134e0bb9924265db3f2b70edd811fa7fde43a4235cea5af0d1cd181ac3ed4a5b361feb4f0ba3b162ae591b0c30a70c6b37c05f403b2d99b30ec98dc7a65da0cd56808781605b4ee732fc611b054f00a83e6e2a6822fa0324e8dbc404e5cec54b8a6c169909828ae213e9eccd465c5a20fb574bf30384582cfdfc4acebc1eec8da511f3c09b333eb6cf6aa117b60a888bf6462131a482eee88cf29f353e6a297ac627fc9c3c9ccdb63ad1ee1bbdd13bc218538e6f11958fb249fd1f10eb4c707853a61eb2cf5beb8b880bf3a3a85c349ae657c250bfd39de5a37117dc2cbbaed842a4d2d996475d4f314ac78d82f5f2b1bd9cee3aeb0ccaf9a83743b2035054b5747af43cd373bd4b7011b00c32b2d399cf0ef56f6c5756da5bcc573db3ba0f581c362c3c7e68b1b9fc83a0b6992455cbcc6fe4dac0d62bfd24db160bc88865c00be65b78364d0713d2356a70656698d6c7df77515999aba6c64d30455adeb4e52ed6f8596ad4c49ab83050b457840db6b6239be95d19068564b08e99d5f67a4cf33728ebce160b3a68c308999ed967f68e9ccc8b5cc6a821c7957a3887f0a9f15352b4cada78cb9598bd20924790bfe18898d6b33e85ce3948a8cfbf5bb93a2a8fc333bfb3cb30efa6da23c6d605810daf5cba3e0b292358ec7c1198c5e2b8f6e795f50f3b2acae5a64cd289640770735eb90ae61bfd41f9ff90cc78e833b8c0d9f6419a892da5e48fa6c668e3d0e6745c3ae89b9511ffdd29481f58e2e0ab3cb8c5702347d5621c55c1aa98b0bb4d465812778b6df2d3137ff7997bf65b3c719de0db61dcdc30d8911e50c9e3ff61bcae1add2bd493b657d7ba126907dedabc14c39909a3cf64dad2473b1857454e9338d30a4543c5c5a657d05b24a191ef33d69172978d1e8bb4ee8fbcbf30e251b21d5287540957d909f3e68aaee74f96ce87162e3ce69baddb1e28a08f7788a8e86f7dbae7b4edada4616cc206611cec3a5d9f21d035c977e2132566060bb5da3571cbb637340bf82eebe1a8dfd5c293362fa32d457139eff2b38d83c7934e7eaf3d18d799922a0357e8357200e39d72369b5b553772d9b37cdbddbc7a5a2405d1246855533008efefe1aec7b1b564594a1a6aeda7f7709d77e91cfbc7a5277b81848b162006d5bb058d7dadd7545f839feb3afc1dd2cb42145e47852c71e90cea0e8c2bc66ea7c5d91fe4c0641a48a4d6379257b0af91ef366987c6552bdb78a9cb1a22f560faa9b0a72984fec256ad6ac9650f88bdf57fb23a0886e449076dab93cb7c337db90ba08ff49b8537a6a26da868dabda1107bab3f6e66f00580165e9e0e6787c6923274285e6e0b5e2c7dc7cf57d725bc897855e4c211299a6ec3926de9787ef94c4edc9291bf4bfc8602cd7c9aa7845d4f3650f1e48b37a94db911d2fc3e7a0c196ba7883db61bc84d4fc1f1f1d3b2125dbfac1518d7b9a1937efacf620e83cd4102fc159b8d1823844e85945828092e60f896ca05659db7467208a6c4a8f8d11ad979f3fab5b1aa6e1e6327799a515ad1cb51425ff701dec4d2e248f611080b14c531b51ab07d503ab9e6d04026a4e4049c558fe65db44500bcf101103dfcc2af7f087e88e0b945c718216f3b4d7acac3070f7251c235aa0fad057d30e07d8b9108efb9c3848d3f75790b8c7f2d490fae91accee0be8f74996340787594af515768536551d76ecee04c3b2237080b572b7d14bb5366c540acbfa6aac9ad1aeb723fd0263fe6c2bb7992aa23d081058d74f12d6c5f40f02e5e38101ff3feb0ec26493a478c936277401c402801291515a9f489c038bd3d946125af3fbcd9989fbff22108d71f38c68ddddc89e132444d452326117b9198ce0dc9c0415a9f6c05169fe48862d54b504a8c91abd40a1a32b10d8d0787c24900190d5b8bff132c7b5e29a396b460da9f510b6e4d9e3d83d1ce81910f61950a91560bee5f359356bdd3f47e04479803189e5ac76bfec8257d602758256a4095d0c1589cbc856b444085d8847d203916953d9f8830694eb348cda567274ef006764c6f7797a8359be0d587a1919f54c8c8297f9ae2d0263431408dd1db2ba6f33a378a0755552c790600dc143e3042391bfe17890bba525b005b3469e8bd143fca291536659013febe99258111f7e488a6c0bbd088eab1afc157d18898ae7ca8e29daeba4e8f8", 0x1000}, {&(0x7f0000000180)="81e1ce83e341b5a1238e4f716d286221815e6e329f0a9979a103bb602603b809c21c5b7d0c79e1ec0cb466af8deecab4b7781c903aa8e99195c5f9dda5e1623ae5885bacd939a964fdb0f4d6fa1357a3afa4ecc7e7e027e1e5bcac04c220ac4e4baa73c9c79c89eefeb9046773ec1b7b66abe7369e", 0x75}, {&(0x7f0000000200)="aa6f19c04e7994046ea1b52db2beaf3ff34701646e6b6161be71ae4643217eb782fe88e417159c80dff5a71e7bc403120234fb7be4d19908d3b1787ef4399d9752a70bb10dcf8d3b0490c5abbd4ecba5268f93292cff74c1d005e75f075fc48c8f394b9ec27ddec094afe3d6d3a53a53334a1a592e923ad4035f461c07769220a1134561d9a12f739bb46da600d4b893ed8c0e1569ae01b1", 0x98}, {&(0x7f0000000380)="05ef384c819b8d3bea421ce0861e84c16d9ecbc233a44441c4707edb081b98e2508c0e5ec56e0eb4a69b9bb12e475cf1e6c6621cea5598450c6ff63c0182818be77fb37fbbbff1abc170840e57c5c0325dba744904beae5bc02907f5fe80adc22de2547c668a02cead5d333e8479ae32158b54599d62c42d5a62f1a4a4dd3e19325142bf3f14ab07f397352044fcf8ddf454ed168e6d66", 0x97}, {&(0x7f0000000080)}, {&(0x7f00000014c0)="9af0ecc06f25da63d1e82755b050afd94fb3f6f2ff25c38244c867f73464a58fb086e66ab41b5be02ef157e9dd7108d14a18d8eaf171b29e841240e08af60ab9170623d2d73a0a004aacc49db2ed9f934f1c783c6993f8291a4f4048c51db53850b86628163478313362e161dcfa0e0f7389b19c2881f72ef92c49e110f22293cdbd0f93", 0x84}, {&(0x7f00000002c0)="53860b9e42035c676e602db76099167a6983769d60c097b12f46d0e6d9b0558cf7d6fa813e9b6a6bbee351046f293554a24a0f6218ead2a590b534f2d26854eeea087a0e82c4e110b71bdc2acea6c441891bf0b25c9c27e8f6fd963e6dbe75e6ef635ba2d23bc52b892c39ebf26b", 0x6e}, {&(0x7f0000001580)="f008810206eed9d0e8e8bfc5d57bcefb4b1a6a9a8d6aa47d2e0dbab45df913d81dd54f9a41cccb158437ea9447f4be6df15d89b571c869133166b39928645a4e283056c6553fd2c743f85e1b0c6f28349c0df757f62677e9aebe259f97da4d0d344627a96f4cf57344c89b6c75062a4ad125014e175358bac816642477e1d99ec0c78b0d6051bbdf145be9b8fbec0d866745cb0b5fefb3b643b194e339ebeea29da164cdd53e316bcda749bfd62b371c7dc8d87702ef0b4ce3b477e7ad", 0xbd}], 0x8, &(0x7f0000001740)=[@cred={0x18, 0x1, 0x2, r4, r5, r6}, @rights={0x10, 0x1, 0x1, [r3]}, @rights={0x10, 0x1, 0x1, [r0]}], 0x38, 0x40088c4}, 0x20000000) 18:30:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) socket$inet6_udp(0xa, 0x2, 0x0) [ 1384.371036] IPVS: ftp: loaded support on port[0] = 21 18:30:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1a01]}, 0x2c) [ 1384.403937] IPVS: ftp: loaded support on port[0] = 21 18:30:03 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x16, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045008, &(0x7f0000000040)=0x7) 18:30:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x2c) 18:30:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005008, &(0x7f0000000040)=0x7) [ 1384.651316] IPVS: ftp: loaded support on port[0] = 21 18:30:03 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000080)={0x1, 0x5}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0xa4) 18:30:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfc03000000000000]}, 0x2c) 18:30:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0045002, &(0x7f0000000040)=0x7) [ 1385.147470] usb usb5: usbfs: process 32058 (syz-executor0) did not claim interface 0 before use [ 1385.194333] usb usb5: usbfs: process 32062 (syz-executor0) did not claim interface 0 before use 18:30:03 executing program 0: unshare(0x40006000100) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x104, @tick, 0x8, {0x80000000}, 0x3, 0x1, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:03 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x33b4854e87746877, 0x0) [ 1385.976124] bridge0: port 1(bridge_slave_0) entered blocking state [ 1385.982727] bridge0: port 1(bridge_slave_0) entered disabled state [ 1385.990351] device bridge_slave_0 entered promiscuous mode [ 1386.041691] bridge0: port 2(bridge_slave_1) entered blocking state [ 1386.048233] bridge0: port 2(bridge_slave_1) entered disabled state [ 1386.055742] device bridge_slave_1 entered promiscuous mode [ 1386.105476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1386.155520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1386.309073] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1386.360441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1386.601291] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1386.608826] team0: Port device team_slave_0 added [ 1386.656682] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1386.665483] team0: Port device team_slave_1 added [ 1386.713349] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1386.766351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1386.773327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1386.791242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1386.833197] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1386.840790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1386.850489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1386.892267] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1386.899598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1386.907697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1387.310853] bridge0: port 2(bridge_slave_1) entered blocking state [ 1387.317311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1387.323925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1387.330372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1387.338256] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1387.737628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1388.974449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1389.154601] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1389.261129] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1389.267373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1389.274438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1389.374836] 8021q: adding VLAN 0 to HW filter on device team0 18:30:08 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xa40, 0x0) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:08 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000400000541b, &(0x7f0000000040)=0x7) 18:30:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd401]}, 0x2c) 18:30:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}]}) 18:30:08 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000100)=0x7) ioctl$VIDIOC_ENUMINPUT(r0, 0xc04c561a, &(0x7f0000000080)={0x3, "b3c68145992169876c95478000af8a5ef344932480cf331e7ccef294c987c821", 0x3, 0x2, 0x5, 0x0, 0x4070204, 0x8}) 18:30:08 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x202201, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x802c560a, &(0x7f0000000240)={0x4, 0xd, &(0x7f0000000200)="44453b081f4bcb775dce1581ac605b9413f8c2d92626b71bf3bcde0e051f00fdb98bf18f4dfbbd623df615d0b1e56d", {0x80000001, 0x3ff, 0x7f7f5f5f, 0x7, 0xff, 0x5, 0x82149b934200aa87, 0x3}}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) recvfrom$inet6(r0, &(0x7f00000000c0)=""/145, 0x91, 0x40000100, &(0x7f0000000180)={0xa, 0x4e20, 0x9}, 0x1c) [ 1390.101865] IPVS: ftp: loaded support on port[0] = 21 18:30:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0405619, &(0x7f00000000c0)={0x40, 0xffffff, "703eb87eae5c89c94488ddf59e0729d7072b6c807679f57a", {0xfffffffffffffff8, 0x4}, 0x101}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x8000404004500d, &(0x7f0000000100)=0x7) [ 1390.166219] IPVS: ftp: loaded support on port[0] = 21 18:30:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6803]}, 0x2c) 18:30:08 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="7e692205f7ed46da2aae8b9298a726550269a8cabd67836b1e43ec394f623e17bb74d1818846e4b352cf55516bbe119d94b7275c054adc8d1c269a1cdb6545ebe5fbab8f3b3d167f759ea3b11c79680997575e2681240a522c0c7e0f9ece8c42dc680d4b58075dc6cd576f0c25363056e5a87d9c0039c82d5a5bd2363609e7037b3336aaff10274aa0fa8e017610b4b4c42ca6fbd283edaecf27098908b8299f75b239840156bee16049637b8f8e481fd4b6764eda02240bebcf8ff47cd4f0f3b1d2a0997f3d3d050083a594777a322bdcd5466db67fe6c22fd71e49b0060f071f51a6da1f944edc8dd84b5bf444f6dda4c533aa7c11cf018f50a67acc9dee8f") close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl(r0, 0x8, &(0x7f0000000100)="44c3b74c76e9a09120321eb8eba7166d46524a9905dce8a36ef92f24edfc7584cebf21edb30822fe969b747ab5ad28ab11da9a7f94c4723e1ef55c9bd8f91e2545263aba9a9239886f13381d36b2bde3") execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:08 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045005, &(0x7f0000000040)=0x7) 18:30:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 18:30:09 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x80004040045010, &(0x7f0000000180)=0x7) r0 = eventfd2(0xaff, 0x801) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="344b280d356c253363dd2a84a748babe7938ee2fda4178c0aa538c3d04d0e917c0b6ed337e97b2f3afd1a29f13e6e5802a2784e860bfbade8ee6f2b3c9f9aee5015f5e46f5705cb33aa040ea1d2fb432368121033555a353db9ba565e06d38bdc9d59abe36768e8c9286f941afff0b88ea689852a8c5ae134372df9cda09301c841832ecdbf1d85ea75a6e3beff61f2a57d9e1076225f92e088a8e6d9f8bbf1f185da4526369e0ed5fd71c37e48593629fa97b8a424013b534bac93b36a0ff0d955066ddefa97fd098d4e43d35cc02a35f883ca43bb5fbcf14ab2fbdac9edecfcb28", 0xe2}], 0x1) 18:30:09 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045012, &(0x7f0000000040)=0x7) 18:30:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3200]}, 0x2c) 18:30:09 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xfff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x8000) 18:30:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x900]}, 0x2c) [ 1391.023119] IPVS: ftp: loaded support on port[0] = 21 [ 1391.073242] IPVS: ftp: loaded support on port[0] = 21 18:30:09 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6, 0x402000) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000180)) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000100)={0xffffffffffff0000, 0x80, 0x7, 0xfff, 0x5}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x301000, 0x0) 18:30:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x290]}, 0x2c) 18:30:09 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000408004500f, &(0x7f0000000040)=0x7) 18:30:09 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:09 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x2c) 18:30:10 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045017, &(0x7f0000000040)=0x7) [ 1391.329429] IPVS: ftp: loaded support on port[0] = 21 18:30:10 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 18:30:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1400000000000000]}, 0x2c) 18:30:10 executing program 4: clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)=0x9, 0x4) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0081f3279f90ffae6c0ca1d71608433d1baffeff0220f1d1f000000000000002377aedb00000"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000380)={0x0, 0x0, 0x2080}) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:30:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x803000000000000]}, 0x2c) [ 1392.130879] IPVS: ftp: loaded support on port[0] = 21 18:30:11 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x200, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:11 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="fb80274776f2c45df509f762c987b9a12171d999858895a56b0000001a1a5dd5da7c2d1fa2ef87eb09117549e87e8b2d0000000000"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:11 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_open_dev$vcsa(&(0x7f00000007c0)='/dev/vcsa#\x00', 0x4, 0x200) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000800)={0x0, r2}) pwritev(r0, &(0x7f0000000740)=[{&(0x7f0000000080)="6d123ff5f64d22ceca62eef6ec2fdb6a8cc27aed67477d5c4caddb6b0edd15d369b90b72e2e675b588642b2cb082e1278ae0610216d0d3b1b72a411b1794a6c65f64d82d436635b584d0a0b17d6f8247d24af00c7928f1d6620f85dcc11a2033dddb235dbf6aaba541c92a74a9ac06dad256aafb3f310d75d5f2436bd642321d994f0363c0dfbcd69124cf3c3696fbd1d638b1db59d1fb21e126b4fa9a2a7c76a86adc239b0b5aefc84b2cf9a914eb832a931a76c3ee5ccb8e1842cbc5070ff5c81d0142140903240307592ffb2d32c7ff067dd49e5de4ad3eefd3812cc187c653", 0xe1}, {&(0x7f0000000180)="a16ac1aade052b458d81642fa4d3d481e069a988f51ccb691b86701261cb254e973e7cdfb1b09524720e12f796cf5ec5dff29afe8e26ec1816c032bf3a7177fcbdfa2c2641978bfafe26f1d9a580abebd3291b55bc15be9f7d776b0ae7334687e26d3493313e0a69e9e5ef4a5bd943fe1a66abbade556b187d3125d0d8bcc5f8bd51af349fa84a44292e741f505d096252f5896462ffe80f561ec3ee3b277af439f509a04ae1b4b45d3601fa489c1a78a18997c2e98dae3e5d20", 0xba}, {&(0x7f0000000240)="2487232d0702b6cef2a69b9f9ae8e915ef810e073758fee3418120776a878e409b5713314ed6bc533ac44657bcd5e92742efc49d3d7f0cbcdb1d5f5ef1ec91961544a50e54dc8b861b75a72855cba01ea44224513895e1137572e6bf3f172428bdb334ed5f3a0de55f42e080", 0x6c}, {&(0x7f00000002c0)="4a77bf43d69108f9f2d1cf619cbf5b432d1f17131feb388a91cac84d030e042f9613b071673a7764951a08c80412a28ecc8c7a17153deade0eb3c61adcfcfef70c7ce565b66dab633aad30f5adbfc75d5c9acf3a4b3c35751dcc4c5747599cb29352aa2d403baefce17b1358213e02ddd95cd0eb48c7ab12c98d2c989137454dce9c2a91c40da7c0cb8cfccb4804fc615e20ca5eded73f1b938a3e2cade068cfac5c30014b1fde64c653cf68b5c0cec6c4394c4078b3dc9ac70eb62acc7e4559e5eb9797453fc3acae97a69a898ada6e392ba6b0a4591411318c1754f659c2c2", 0xe0}, {&(0x7f00000003c0)="9e770976bdb23a1510d1a4cb730afac8dd30ac275e2d3f6f1cfbaac242b7433376234a2bc826282b07e88fda01fd4bb9d44ddab50b004c00cb8ece875a49aaf4b5700398767a644bf40f8ad4572e8ace52db29e45669c15f964969414661a00e5a80bec6dffbda1de2a14c0e5fc331ca7ca3324d5d13cfd2a304bfb65e2dbb60ae2de63ac39b0ae562187918d6230a4e68276c61f0936d75127f1318a75d8447a314631d6727872ca910fd412d8014240dfef9a0d8fed6f6e5b1374f583ba21ee4c489911d70fea2bc5dd3b0418c7155ee52fb537e0d1097f8972ae01f24cd9b9f3602173f9aaf1d0c498f6c808160df", 0xf0}, {&(0x7f00000004c0)="e00e8d624b03d18a84220b54a3473a3b1cfe9fe0ca7575f3bb2ee7516b1ea679bf44b059d6b5aaba8ee1628b09cf1488aa0b9fae5fe686823803de0f5665c4fa067e03ea6e83c4bd790243ed1056", 0x4e}, {&(0x7f0000000540)="72e71eab5fbc7b5f1d6f8d50020a4d8f1f92ef0c7449da2af3fc70af1f8b710af7cbdba71ed6618d6a0314d5fbbabacbac3f3eba9dc7d92d58d78274a10eac2b402ee3306e626002e37d44ce7f996570cb8e6457e8711ca8aee9d47bb6a39fd1f70a9c357a2421a1e434d79b5ce1fe422c1beea209a60ef44da9657ada7aaa5cdb862fcca3a47895abf20adc6a20fafeafe9bc56ea15f9864393379f962900f735f92069b9379908b97bf4b8e467e115e1ccc648af438edd3b1dabf1a3de340eab9b8a2e9308ceebe342d5b2811e7956af88de0c7856ddc2688b1752b73d84de86977fc18c75", 0xe6}, {&(0x7f0000000640)="1bafcc8183f123721a56d92b65cbdb1eee75a69ca488a6b415a985f70d9e2cb32de99eb4b026de17feff72a1b97e3d2965602cc80c800b425aa7ffdd19154d35eec44edfccb3cf38373bf8a2c899a344ad36", 0x52}, {&(0x7f00000006c0)="e583f1d46b45a22da2da2aa49157c17bc4b82c8c2faebf3de9ba4c8e71fa3f8232dcea30da5867734674d739b72757e088f53ab869337fe36568028542321c1aa7de3e0638", 0x45}], 0x9, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r3, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:11 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0045004, &(0x7f0000000040)=0x7) 18:30:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x13000000]}, 0x2c) 18:30:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2002]}, 0x2c) 18:30:11 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x200000, 0x0) 18:30:11 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005000, &(0x7f0000000040)=0x7) [ 1392.540612] IPVS: ftp: loaded support on port[0] = 21 18:30:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x220]}, 0x2c) 18:30:11 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000001580)='/dev/usbmon#\x00', 0x2, 0x4000402) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f00000054c0)={0x3, 0x0, 0x2, 0x400}) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x80080) clock_gettime(0x0, &(0x7f0000005440)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005300)=[{{&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)=""/85, 0x55}, {&(0x7f0000000200)=""/239, 0xef}, {&(0x7f0000000380)=""/214, 0xd6}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0xffffffff}, 0x2}, {{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000014c0)=""/172, 0xac}, {&(0x7f0000001580)}, {&(0x7f00000015c0)=""/95, 0x5f}, {&(0x7f0000001640)=""/97, 0x61}], 0x4, &(0x7f0000001700)=""/75, 0x4b, 0x8}, 0x7}, {{&(0x7f0000001780)=@in6, 0x80, &(0x7f0000002980)=[{&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/198, 0xc6}, {&(0x7f0000002900)=""/88, 0x58}], 0x3, &(0x7f00000029c0)=""/96, 0x60, 0x5}, 0x3}, {{&(0x7f0000002a40)=@ethernet={0x0, @local}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002ac0)=""/193, 0xc1}, {&(0x7f0000002bc0)=""/199, 0xc7}, {&(0x7f0000002cc0)=""/5, 0x5}, {&(0x7f0000002d00)=""/79, 0x4f}, {&(0x7f0000002d80)=""/66, 0x42}, {&(0x7f0000002e00)=""/232, 0xe8}], 0x6, &(0x7f0000002f40)=""/34, 0x22, 0x2}, 0x8}, {{&(0x7f0000002f80)=@rc, 0x80, &(0x7f0000003040)=[{&(0x7f0000003000)=""/29, 0x1d}], 0x1, &(0x7f0000003080)=""/171, 0xab, 0x1}, 0x9}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000003140)=""/39, 0x27}, {&(0x7f0000003180)=""/146, 0x92}, {&(0x7f0000003240)=""/104, 0x68}, {&(0x7f00000032c0)=""/143, 0x8f}, {&(0x7f0000003380)=""/123, 0x7b}], 0x5, &(0x7f0000003440)=""/250, 0xfa, 0x401}, 0x4}, {{&(0x7f0000003540)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000037c0)=[{&(0x7f00000035c0)=""/168, 0xa8}, {&(0x7f0000003680)=""/128, 0x80}, {&(0x7f0000003700)=""/136, 0x88}], 0x3, &(0x7f0000003800)=""/154, 0x9a, 0x7}, 0xfff}, {{&(0x7f00000038c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003940)=""/229, 0xe5}, {&(0x7f0000003a40)=""/216, 0xd8}, {&(0x7f0000003b40)=""/138, 0x8a}, {&(0x7f0000003c00)=""/244, 0xf4}, {&(0x7f0000003d00)=""/51, 0x33}, {&(0x7f0000003d40)=""/33, 0x21}, {&(0x7f0000003d80)=""/150, 0x96}, {&(0x7f0000003e40)=""/185, 0xb9}, {&(0x7f0000003f00)=""/37, 0x25}], 0x9, &(0x7f0000003fc0)=""/232, 0xe8, 0xf}, 0x7ff}, {{&(0x7f00000040c0)=@rc, 0x80, &(0x7f0000005200)=[{&(0x7f0000004140)=""/132, 0x84}, {&(0x7f0000004200)=""/4096, 0x1000}], 0x2, &(0x7f0000005240)=""/179, 0xb3, 0x8}, 0x10000000000000}], 0x9, 0x10000, &(0x7f0000005480)={r1, r2+30000000}) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, 0x0, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r4, &(0x7f0000005500)=ANY=[@ANYBLOB="ff801acd744ed6a18fb97001852002240cb5b9446a70414b8da63525227c9a14b32c91cf03f1619c803c027bbabe9549b4d29543e4b2e9f15882097e00b2928be5c10105c9d4239a23aaed74bdcb05f3979cf219ff28f57c3855ead4f8953ba8daa76f0812573e53e4ca0d3ddb4770a30c2d2352603696112d17a7622f4e8e"], 0x2) close(r4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r5, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 18:30:11 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045014, &(0x7f0000000040)=0x7) [ 1393.220314] IPVS: ftp: loaded support on port[0] = 21 18:30:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9002000000000000]}, 0x2c) 18:30:12 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x967) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:12 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="091c2c46e813ad1988770a0e472eb346f20775fa995eb1c24a752f70172d3744"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x40000) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000000c0)={0x3, 0x7, 0x8, 0x46b713e6, 0x2, 0x3f, 0x9, 0x719, 0x7f}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:12 executing program 0: unshare(0x6c060000) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40200, 0x102) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x180) mmap(&(0x7f00005ff000/0x3000)=nil, 0x3000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:12 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045015, &(0x7f0000000040)=0x7) 18:30:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4b00]}, 0x2c) 18:30:12 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080045010, &(0x7f0000000040)=0x7) 18:30:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9403]}, 0x2c) [ 1393.746875] IPVS: ftp: loaded support on port[0] = 21 18:30:12 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x8000404004500f, &(0x7f0000000040)=0x7) 18:30:12 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0045007, &(0x7f0000000040)=0x7) 18:30:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x2c) 18:30:12 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)={0x0, 0x0}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000680)=""/99, 0x63}, {&(0x7f0000000700)=""/194, 0xc2}, {&(0x7f0000000800)=""/201, 0xc9}, {&(0x7f0000000900)=""/180, 0xb4}], 0x4, &(0x7f0000000a00)=""/213, 0xd5}, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, 0x0, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="0100"], 0x2) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='/dev/vhci\x00', &(0x7f0000000140)='/dev/vhci\x00', &(0x7f0000000180)='/dev/vhci\x00', &(0x7f00000001c0)='md5sumem1}cgroupsecurity\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='md5sum\x00']) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) bind$netlink(r5, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) unshare(0x6c060000) 18:30:12 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x100000001, "33ea8597331660ad568292c03707d030d8efcc247df8c975e89574ad247ad17ed241ccc5bb9b305caa97a7f7b0c1f794636877be6fe796217e25019d8153049b4ff24b6387dc42ee0a5fa7a51d17b4e7698f62379f4a388e6a3a9d072adade74058c12526ed93c4ea2419e397148e9d7b2c8eb80c11660870ae070d06c165a3eecd6e6531e7cc1d6971d830e453af314f1ca38083653dbc73630663f530836d1536fc1264cfe11b6908a0cdcb87ec9994366d482fa27d8e9570a6d34753eda1e79cc8ab0642b0b031667a1d365c3ca1c339bf95a923d4e3514576003183161ccda71096080830315af62d24bb38678772fa5aac7fd0cffe9aff2bf10139ad99a", 0xbf, 0x9, 0x9, 0x3ff, 0xffffffffffffabd6, 0x10001, 0x9, 0x1}, r1}}, 0x128) ioctl$int_in(r0, 0x80004040045010, &(0x7f00000002c0)=0x7) 18:30:12 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x2c) 18:30:12 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000408010500d, &(0x7f0000000040)=0x7) [ 1394.224179] IPVS: ftp: loaded support on port[0] = 21 [ 1394.291489] IPVS: ftp: loaded support on port[0] = 21 18:30:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd000000000000000]}, 0x2c) 18:30:13 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) socket$key(0xf, 0x3, 0x2) 18:30:13 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='/dev/vhci\x00', &(0x7f0000000140)='/dev/vhci\x00', &(0x7f0000000180)='/dev/vhci\x00', &(0x7f00000001c0)='GPL))cgroup+:]vmnet1keyring\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='/\x00', &(0x7f0000000280)='keyring+\x00', &(0x7f00000002c0)='em0\x00', &(0x7f0000000300)='/dev/vhci\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x400000]}, 0x2c) 18:30:13 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0045003, &(0x7f0000000040)=0x7) 18:30:13 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80000000001, 0x840) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$FICLONE(r0, 0x40049409, r0) 18:30:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) 18:30:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:14 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x141002, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000100)=0x7) write$P9_RATTACH(r1, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x0, 0x3, 0x2}}, 0x14) 18:30:14 executing program 4: clone(0x2112001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000200)=ANY=[], 0x28e) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) getsockopt$bt_hci(r0, 0x0, 0x4, &(0x7f00000003c0)=""/184, &(0x7f0000000380)=0xb8) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x101ff, 0x3, 0xf004, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x801, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000240)={r4, 0x4, 0x9, [0x80000001, 0x80, 0x1, 0x1, 0x2, 0x56f, 0x3, 0xffff, 0xffffffff]}, &(0x7f0000000280)=0x1a) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x41000000}, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000001c0)=0xd, 0x4) 18:30:14 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000404004500a, &(0x7f0000000040)=0x7) 18:30:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x212]}, 0x2c) 18:30:14 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='/dev/vhci\x00', &(0x7f0000000140)='/dev/vhci\x00', &(0x7f0000000180)='/dev/vhci\x00', &(0x7f00000001c0)='GPL))cgroup+:]vmnet1keyring\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='/\x00', &(0x7f0000000280)='keyring+\x00', &(0x7f00000002c0)='em0\x00', &(0x7f0000000300)='/dev/vhci\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:14 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0189436, &(0x7f0000000040)=0x7) 18:30:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6803000000000000]}, 0x2c) 18:30:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1395.622119] IPVS: ftp: loaded support on port[0] = 21 18:30:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x188]}, 0x2c) 18:30:14 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005016, &(0x7f0000000040)=0x7) 18:30:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfe030000]}, 0x2c) 18:30:14 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip6_tables_names\x00') ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000100)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="414ad6ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:14 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='/dev/vhci\x00', &(0x7f0000000140)='/dev/vhci\x00', &(0x7f0000000180)='/dev/vhci\x00', &(0x7f00000001c0)='GPL))cgroup+:]vmnet1keyring\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='/\x00', &(0x7f0000000280)='keyring+\x00', &(0x7f00000002c0)='em0\x00', &(0x7f0000000300)='/dev/vhci\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:14 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080044d76, &(0x7f0000000040)=0x7) 18:30:14 executing program 0: unshare(0x6c060000) r0 = mq_open(&(0x7f0000000140)='vboxnet1ppp1selinux]\x00', 0x801, 0x40, &(0x7f0000000180)={0x9, 0xfffffffffffffff9, 0x3e8, 0x200, 0x1, 0x2871, 0x1e1, 0xc1bc}) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x153) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x805, 0x3) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000100)={0x6, 0x9124, 0x1}) recvmmsg(r3, &(0x7f0000004dc0)=[{{&(0x7f00000003c0)=@nfc_llcp, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000a40)=""/199, 0xc7}, {&(0x7f0000000440)=""/70, 0x46}, {&(0x7f0000000b40)=""/216, 0xd8}, {&(0x7f00000004c0)=""/48, 0x30}, {&(0x7f0000000c40)=""/15, 0xf}, {&(0x7f0000000c80)=""/237, 0xed}, {&(0x7f0000000d80)=""/208, 0xd0}, {&(0x7f0000000e80)=""/15, 0xf}, {&(0x7f0000000ec0)=""/182, 0xb6}, {&(0x7f0000000f80)=""/4096, 0x1000}], 0xa, &(0x7f0000002000)=""/102, 0x66}}, {{&(0x7f0000002080)=@nl, 0x80, &(0x7f0000002240)=[{&(0x7f0000002100)}, {&(0x7f0000002140)=""/206, 0xce}], 0x2, 0x0, 0x0, 0x100000000}, 0xe742}, {{&(0x7f0000002280)=@llc, 0x80, &(0x7f0000002380)=[{&(0x7f0000002300)=""/67, 0x43}], 0x1, 0x0, 0x0, 0x1}, 0xfffffffffffffe01}, {{&(0x7f00000023c0)=@generic, 0x80, &(0x7f0000003840)=[{&(0x7f0000002440)=""/223, 0xdf}, {&(0x7f0000002540)=""/243, 0xf3}, {&(0x7f0000002640)=""/78, 0x4e}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/35, 0x23}, {&(0x7f0000003700)=""/253, 0xfd}, {&(0x7f0000003800)=""/25, 0x19}], 0x7, &(0x7f0000003880)=""/170, 0xaa, 0x8}}, {{&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004d40)=[{&(0x7f00000039c0)=""/161, 0xa1}, {&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/131, 0x83}, {&(0x7f0000004b40)=""/227, 0xe3}, {&(0x7f0000004c40)=""/231, 0xe7}], 0x5, &(0x7f0000004d80)=""/22, 0x16, 0x3}}], 0x5, 0x2, &(0x7f0000004e80)={0x0, 0x989680}) sendmsg$xdp(r3, &(0x7f0000005140)={&(0x7f0000004ec0)={0x2c, 0x2, r4, 0x29}, 0x10, &(0x7f0000005100)=[{&(0x7f0000004f00)="21224d3e9605ea8b1748df2493ae76c5b26789c248c207d9536e3596df9b64644d03941532beaa8b22828b79b4471f0826456a3946abcb65a71550437c6049e473eae12ba14900e019152aedcf05bf03f600c865022d62b7fe42292bebd33b89be49041967266db0184fe087628cd1acbbd65174af403a107c4e49088b7fbe0d3c6c4d6e24fb6a156d916d4a7725b21ffbb56b021ca3948731b197db53a70d7504400787d9440e500483887a9de68f8fa5a58d22f922c4d9621ecdaf16ab7e1b195782c15ef6e0648dd6d046fa72570869eeee", 0xd3}, {&(0x7f0000005000)="e99b761b65509255340c8b5a1199079cfd3a979cd869ea8ae259c160479fabe8767d83f6e12b3fa689057ec50147a6a58941951bf756843ea28e2e9696ccbd8b828e319af9255030c51510d6c796de1cf31a629fcb9f5e7e64cacb3e7aa66d883fcf7895b6f29593b5e69c5289714d79a63dac0027f44652d70d074f6ceadfaaf37d1181c30712ad95946f17ff6872", 0x8f}, {&(0x7f00000050c0)="89791a4a8a4407ee54a5bfb8d6fb49f6e9a21047b13ae199f8", 0x19}], 0x3, 0x0, 0x0, 0x8801}, 0x91) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00', 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000005180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000002100)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000051c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x800, @dev={0xfe, 0x80, [], 0x7}, 0x2}, r6}}, 0x30) sendmsg$xdp(r3, &(0x7f0000000a00)={&(0x7f0000000540)={0x2c, 0x0, r5, 0x38}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000580)="8496fbad18230cbbe6103c4b401312e356f5860efe0ddbe5527709f44302b064435fecf8bfa36fe0a6f401dcedd1260101adb7693ea2f91c3a90bf4050a6d613d323c23f49d65fdd8ef68d56479a44ee64cd1863fb25ed5c35d65955374af65b8731cd9d4d63c66e2af6ffb658d56af93b11d74fd995ea28474d58a925298d7939bdb08040f29141e17fc45d417e2fb42778119cd5a45390caf5edc23b8597db2eb83ef55caa303e73", 0xa9}, {&(0x7f0000000640)="5c0679e5fc2e78396fe073a147383bedf9dd63d2eecffcdae3e74cadafa62d0537cf2b82c73da618a92aaa1a96abb310cae15ae702a970cda1d2780af70b798f6a249993848ef201db29b9895e21b07d4e378e9b85f613464ee9bc106670d3f453f8fc45e2a2fdcbd3562903bb06ee445cb08aecc06ae92df6e23d7e910bc0dda63677535bccfe1b1d6ebb644613d1499a8527fee97ea24019d416a0e5425d14dad2b712acf97d45bde6096cddc332ce9e529f06a6ca30d17c877d1758aa4a3f6f45ec5f6873bd811b1b9bc566f187b42236e4ee897e", 0xd6}, {&(0x7f0000000740)="106a33dd58dd09d4d91b847b9b38e726f111d02c28596e73f15760d1c38c893c0895bf1e73bc12e031a3cd3203e32a963a8368dfe4599f4e6b263d4f06083b8db78e9ccc9865f7ac5e342c3f987a5574a48b5e7cc81a86819904e6d011095eda65f0fa275fdf6acd35d7b5c2f8c0775325f37778872c77ea045450aef0e750c91c155db15357b4bafb6e41a5a3fbec8ddc986684e0b613d3db02d7af033656c3087f39e25eed65f27cff257fabe93c9fd7a19a8d1c2c29c6c753975528bf4c7c6c141863ae9d5644c7d5cfd6d640e9999a5cf826fecdae8a347c3ba8a7a69668c9a1ef7d1a0f72e1b0", 0xe9}, {&(0x7f0000000840)="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", 0xfc}, {&(0x7f0000000940)="dea5727aed91cd5df66c5e6b236b9df660e55ad0121cd6fedb503f45c5b97304fcbd7189eae1f041558ab168faad4621633e810138b18312e721b1730067bc99e725829869c7f3ac63f9871ef4a8bd85875fbca40e2c42be75e0b7383949", 0x5e}], 0x5, 0x0, 0x0, 0x80}, 0x44014) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfeffff03]}, 0x2c) 18:30:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000404020940d, &(0x7f0000000040)=0x7) [ 1396.380086] IPVS: ftp: loaded support on port[0] = 21 18:30:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2500]}, 0x2c) 18:30:15 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x96, "b8643518629cd6b8bf062535946450bff82f0c07c840590c30e31d5c288adfbd6bffee2179a933ec0a8bd1988f89fde7a029622e249489be6552267ee2f0cfab8601d695ae9e3d2a7fde4b80878c1384ba7a286ed03485681d510ad5fa4eefd1a8d03b05095f5ddbb30a2dea5a90e43df9f3444119106764544efae0ad3284a9a0f30af09add97dffe1eac18cf07a5780b45fd8849ae"}, &(0x7f00000001c0)=0x9e) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r1, 0x8000}, &(0x7f0000000240)=0x8) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x8004, 0x5) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9]}, 0x2c) 18:30:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040402c5828, &(0x7f0000000040)=0x7) 18:30:15 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='/dev/vhci\x00', &(0x7f0000000140)='/dev/vhci\x00', &(0x7f0000000180)='/dev/vhci\x00', &(0x7f00000001c0)='GPL))cgroup+:]vmnet1keyring\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='/\x00', &(0x7f0000000280)='keyring+\x00', &(0x7f00000002c0)='em0\x00', &(0x7f0000000300)='/dev/vhci\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x2c) 18:30:15 executing program 3: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:15 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6832b8400898e79c9b2079aa9fb6b26edbef3d7921186892a3f7f77ca54e6a0b6044d43dffff7a8a029f46eed513474dc074148051110ad4477ac5df545158d1d3c3314d25d0b43bd9c8e896e2c6a7e4122efe76c4f34826175c61a3"], 0x2) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$inet6(0xa, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000340)=0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f0000000300), 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) r1 = getpid() capset(&(0x7f00000004c0)={0x200f1526, r1}, &(0x7f0000000280)={0x0, 0x200, 0xffffffff, 0x1, 0x0, 0x4}) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x15555602, 0x9) sysinfo(&(0x7f0000000780)=""/224) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000640)=0x9013, 0x4) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f00000005c0)=0x7, 0x4) unshare(0x40000000) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x400000f, &(0x7f0000000c00)="6ef45a702210c22bbada037409e8783d58bdbe8a88540000abeca76c99054eb201f80e55bfc832f31a4fede1ff8b4d8a6f4b8d67335680ec7da63731ba194fcd8572f66c1de6bde4a70643c5859d967a5f8316f8fdbf59760824dd98", 0x5c) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000e80)=""/237) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x8}, 0x2ed) splice(0xffffffffffffffff, &(0x7f0000000bc0), 0xffffffffffffffff, &(0x7f0000000b80), 0x2, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)='E', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x8dffffff]}, 0x9}, 0x1c) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000600)={0xfffffffffffffef8, 0x5, 0x0, {0x0, 0x4, 0x0, 0x6}}, 0x30) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], &(0x7f0000000a40)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000a80), &(0x7f0000000ac0)=0x8) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x44081, &(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) 18:30:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040049409, &(0x7f0000000040)=0x7) 18:30:15 executing program 3: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb000000]}, 0x2c) 18:30:15 executing program 2: clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)=0x9, 0x4) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0081f3279f90ffae6c0ca1d71608433d1baffeff0220f1d1f000000000000002377aedb00000"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000380)={0x0, 0x0, 0x2080}) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:16 executing program 0: unshare(0x6c060000) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) fcntl$setown(r0, 0x8, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000100)={0x282, @time, 0x2, {0x3, 0x6}, 0x4, 0x1, 0x6}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f00000000c0)=0x54) 18:30:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x80000]}, 0x2c) 18:30:16 executing program 3: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1397.431243] IPVS: ftp: loaded support on port[0] = 21 18:30:16 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000400000500e, &(0x7f0000000040)=0x7) [ 1397.515131] IPVS: ftp: loaded support on port[0] = 21 18:30:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xec03]}, 0x2c) 18:30:16 executing program 3: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:16 executing program 2: unshare(0x40006000100) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x104, @tick, 0x8, {0x80000000}, 0x3, 0x1, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 1398.194526] IPVS: ftp: loaded support on port[0] = 21 [ 1398.202935] IPVS: ftp: loaded support on port[0] = 21 18:30:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@mcast2, @in6}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000300)={0x1, 0x6, 0x2}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0245629, &(0x7f00000002c0)={0x7fffffff, 0xb030, 0x1f5, [], &(0x7f0000000280)=0x5}) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f80"], 0x2) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f00000004c0)={0x0, 0x200, [], {0x0, @bt={0x0, 0x1, 0x0, 0x3, 0x10001, 0x9c36, 0x7, 0xfff, 0x9, 0x2279, 0x7, 0x3, 0x7, 0x6, 0x4, 0x8}}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000380)={r4, r3, 0x81, 0x7fff, &(0x7f0000000240)="50d4183754ea209d36d947415c57d6cd70a8f8fee43d8ee3c8d76a072538f2e923a2aeb3e0120ebed677b9a4db9907c603ec8c26f0b42269addb7719b79bfd", 0x3337bc3e, 0x3, 0x40000000000, 0xec, 0x2, 0x9, 0x3, "4db7864f59d59e83fc45b39e50ef697f5d14d9d5cb487d18fcf35615e2a6dc1e5106d31ee0e8c4d119cc316d23551fc2f1db590aabe44ca1b2e92a0933869f131f36c6b61dff790a34b9892d72b77829a152960eac91f351174a25ef0a89a3c76a7282cd52dd547896d5b1d7ab39303c1143c11255292e5f816963ec47b643d072c24a275c177df5bec9706302edb36a29c1604e6a61444b52f1809a0a967fa4315532a4a49191fceacf1e72d47eb82a5fdbbb7aceb8455f0970a6d516200444e1c6d891be"}) 18:30:19 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045018, &(0x7f0000000040)=0x7) 18:30:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xbc000000]}, 0x2c) 18:30:19 executing program 3: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:19 executing program 2 (fault-call:9 fault-nth:0): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1401.021591] FAULT_INJECTION: forcing a failure. [ 1401.021591] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.087878] CPU: 1 PID: 302 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1401.095131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.095140] Call Trace: [ 1401.095167] dump_stack+0x244/0x39d [ 1401.095196] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1401.095226] ? debug_smp_processor_id+0x1c/0x20 [ 1401.120659] ? perf_trace_lock+0x14d/0x7a0 [ 1401.124924] should_fail.cold.4+0xa/0x17 [ 1401.129007] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1401.134130] ? __f_unlock_pos+0x19/0x20 [ 1401.138130] ? lock_downgrade+0x900/0x900 [ 1401.142305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1401.147858] ? proc_fail_nth_write+0x9e/0x210 [ 1401.152394] ? find_held_lock+0x36/0x1c0 [ 1401.156497] ? perf_trace_sched_process_exec+0x860/0x860 [ 1401.161963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.167517] ? check_preemption_disabled+0x48/0x280 [ 1401.172562] __should_failslab+0x124/0x180 [ 1401.176813] should_failslab+0x9/0x14 [ 1401.180637] kmem_cache_alloc+0x2be/0x730 [ 1401.184798] ? do_fast_syscall_32+0x150/0xfb2 [ 1401.189314] ? do_fast_syscall_32+0x150/0xfb2 [ 1401.193829] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1401.198434] getname_flags+0xd0/0x590 [ 1401.202247] ? trace_hardirqs_off_caller+0x310/0x310 [ 1401.202280] getname+0x19/0x20 [ 1401.202300] __ia32_compat_sys_execve+0x72/0xc0 [ 1401.202322] do_fast_syscall_32+0x34d/0xfb2 [ 1401.202346] ? do_int80_syscall_32+0x890/0x890 [ 1401.202366] ? entry_SYSENTER_compat+0x68/0x7f [ 1401.228783] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1401.233816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1401.238681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1401.243547] ? trace_hardirqs_on_caller+0x310/0x310 [ 1401.248579] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1401.253611] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1401.258652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1401.263518] entry_SYSENTER_compat+0x70/0x7f [ 1401.267933] RIP: 0023:0xf7fbca29 [ 1401.271315] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1401.290225] RSP: 002b:00000000f5f970cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1401.290242] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1401.290252] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1401.290262] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1401.290282] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1401.290295] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:20 executing program 0: unshare(0x200006c070000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) sendfile(r1, r0, &(0x7f00000000c0), 0x5) 18:30:20 executing program 3: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2b2]}, 0x2c) 18:30:20 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000404004500c, &(0x7f0000000040)=0x7) 18:30:20 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000080)=0x64663eaa) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:20 executing program 2 (fault-call:9 fault-nth:1): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3fe]}, 0x2c) 18:30:20 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000408010500c, &(0x7f0000000040)=0x7) 18:30:20 executing program 3: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd003000000000000]}, 0x2c) [ 1401.874167] FAULT_INJECTION: forcing a failure. [ 1401.874167] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1401.886059] CPU: 0 PID: 338 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1401.893257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.902640] Call Trace: [ 1401.905243] dump_stack+0x244/0x39d [ 1401.908899] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1401.914120] should_fail.cold.4+0xa/0x17 [ 1401.918206] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1401.923325] ? debug_smp_processor_id+0x1c/0x20 [ 1401.928026] ? perf_trace_lock+0x14d/0x7a0 [ 1401.932300] ? _kstrtoull+0x188/0x250 [ 1401.936133] ? mark_held_locks+0x130/0x130 [ 1401.940388] ? find_held_lock+0x36/0x1c0 [ 1401.944475] ? zap_class+0x640/0x640 [ 1401.948217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.953789] ? check_preemption_disabled+0x48/0x280 [ 1401.958822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.958841] ? check_preemption_disabled+0x48/0x280 [ 1401.958862] ? debug_smp_processor_id+0x1c/0x20 [ 1401.958879] ? perf_trace_lock+0x14d/0x7a0 [ 1401.958899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.969446] ? should_fail+0x22d/0xd01 [ 1401.969463] ? lock_is_held_type+0x210/0x210 [ 1401.969481] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1401.969497] ? __f_unlock_pos+0x19/0x20 [ 1401.969520] __alloc_pages_nodemask+0x366/0xea0 [ 1402.005963] ? proc_fail_nth_write+0x9e/0x210 [ 1402.010485] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1402.015526] ? find_held_lock+0x36/0x1c0 [ 1402.019645] ? trace_hardirqs_off+0xb8/0x310 [ 1402.019667] cache_grow_begin+0xa5/0x8c0 [ 1402.028140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1402.033692] ? check_preemption_disabled+0x48/0x280 [ 1402.038728] kmem_cache_alloc+0x66b/0x730 [ 1402.042889] ? do_fast_syscall_32+0x150/0xfb2 [ 1402.047396] ? do_fast_syscall_32+0x150/0xfb2 [ 1402.051918] getname_flags+0xd0/0x590 [ 1402.055739] ? trace_hardirqs_off_caller+0x310/0x310 [ 1402.060931] getname+0x19/0x20 [ 1402.064167] __ia32_compat_sys_execve+0x72/0xc0 [ 1402.068858] do_fast_syscall_32+0x34d/0xfb2 [ 1402.073209] ? do_int80_syscall_32+0x890/0x890 [ 1402.077812] ? entry_SYSENTER_compat+0x68/0x7f [ 1402.082407] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1402.087441] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1402.092316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1402.097171] ? trace_hardirqs_on_caller+0x310/0x310 [ 1402.102216] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1402.107250] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1402.112298] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1402.117173] entry_SYSENTER_compat+0x70/0x7f [ 1402.121588] RIP: 0023:0xf7fbca29 [ 1402.124959] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1402.143899] RSP: 002b:00000000f5f970cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1402.151624] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1402.158895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1402.166169] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 18:30:20 executing program 3: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:20 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005015, &(0x7f0000000040)=0x7) [ 1402.173442] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1402.180712] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:21 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000140)=0x54) 18:30:21 executing program 3: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) 18:30:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c004500a, &(0x7f0000000040)=0x7) 18:30:21 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004180)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000004280)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000042c0)={@remote, 0x4b, r3}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x3, 0x3f5}) 18:30:21 executing program 2 (fault-call:9 fault-nth:2): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1402.759013] FAULT_INJECTION: forcing a failure. [ 1402.759013] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.791387] CPU: 0 PID: 358 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1402.798619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.807979] Call Trace: [ 1402.810585] dump_stack+0x244/0x39d [ 1402.810609] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1402.810631] ? debug_smp_processor_id+0x1c/0x20 [ 1402.810648] ? perf_trace_lock+0x14d/0x7a0 [ 1402.810672] should_fail.cold.4+0xa/0x17 [ 1402.810694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1402.810718] ? __lock_acquire+0x62f/0x4c20 [ 1402.828427] ? print_usage_bug+0xc0/0xc0 [ 1402.828450] ? __lock_acquire+0x62f/0x4c20 [ 1402.828475] ? find_held_lock+0x36/0x1c0 [ 1402.828515] ? perf_trace_sched_process_exec+0x860/0x860 [ 1402.828531] ? perf_trace_lock+0x14d/0x7a0 [ 1402.828566] __should_failslab+0x124/0x180 [ 1402.828587] should_failslab+0x9/0x14 [ 1402.828604] kmem_cache_alloc+0x2be/0x730 [ 1402.828621] ? zap_class+0x640/0x640 [ 1402.828636] ? print_usage_bug+0xc0/0xc0 [ 1402.828658] dup_fd+0x11c/0xf50 [ 1402.828685] ? __fdget+0x20/0x20 [ 1402.828713] ? is_bpf_text_address+0xac/0x170 [ 1402.828732] ? lock_downgrade+0x900/0x900 [ 1402.842133] ? check_preemption_disabled+0x48/0x280 [ 1402.850418] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1402.850434] ? kasan_check_read+0x11/0x20 [ 1402.850448] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1402.850463] ? rcu_softirq_qs+0x20/0x20 [ 1402.850477] ? rcu_softirq_qs+0x20/0x20 [ 1402.850491] ? unwind_dump+0x190/0x190 [ 1402.850514] unshare_fd+0x200/0x2c0 [ 1402.872253] ? mmdrop_async_fn+0x20/0x20 [ 1402.872284] ? unwind_get_return_address+0x61/0xa0 [ 1402.872304] ? __save_stack_trace+0x8d/0xf0 [ 1402.872331] unshare_files+0xab/0x2d0 [ 1402.872351] ? __ia32_sys_unshare+0x40/0x40 [ 1402.872372] ? save_stack+0x43/0xd0 [ 1402.890943] ? kasan_kmalloc+0xc7/0xe0 [ 1402.899584] ? kasan_slab_alloc+0x12/0x20 [ 1402.899599] ? kmem_cache_alloc+0x12e/0x730 [ 1402.899616] ? getname_flags+0xd0/0x590 [ 1402.899629] ? getname+0x19/0x20 [ 1402.899660] __do_execve_file.isra.33+0x360/0x25d0 [ 1402.899682] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1402.943512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1402.943539] ? prepare_bprm_creds+0x120/0x120 [ 1402.943566] ? usercopy_warn+0x110/0x110 [ 1402.943595] ? check_preemption_disabled+0x48/0x280 18:30:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045007, &(0x7f0000000040)=0x7) 18:30:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045035, &(0x7f0000000040)=0x7) [ 1402.943623] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1402.943644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1402.989505] ? strncpy_from_user+0x411/0x5a0 [ 1402.989534] ? digsig_verify+0x1530/0x1530 [ 1402.989562] ? kmem_cache_alloc+0x33a/0x730 [ 1402.989582] ? do_fast_syscall_32+0x150/0xfb2 [ 1402.989608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1402.989626] ? getname_flags+0x26e/0x590 [ 1402.989651] ? trace_hardirqs_off_caller+0x310/0x310 [ 1403.028443] __ia32_compat_sys_execve+0x94/0xc0 [ 1403.028482] do_fast_syscall_32+0x34d/0xfb2 [ 1403.028504] ? do_int80_syscall_32+0x890/0x890 [ 1403.028524] ? entry_SYSENTER_compat+0x68/0x7f [ 1403.028554] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1403.028571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1403.028586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1403.028606] ? trace_hardirqs_on_caller+0x310/0x310 [ 1403.061074] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1403.061093] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1403.061116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1403.061140] entry_SYSENTER_compat+0x70/0x7f 18:30:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x2c) [ 1403.075317] RIP: 0023:0xf7fbca29 [ 1403.075336] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1403.075345] RSP: 002b:00000000f5fb80cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1403.075360] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1403.075370] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 18:30:21 executing program 2 (fault-call:9 fault-nth:3): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1403.075378] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1403.075394] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1403.085069] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1403.093118] IPVS: ftp: loaded support on port[0] = 21 18:30:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1403.418674] FAULT_INJECTION: forcing a failure. [ 1403.418674] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.441706] CPU: 1 PID: 390 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1403.448930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.448938] Call Trace: [ 1403.448961] dump_stack+0x244/0x39d [ 1403.448983] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1403.449004] ? debug_smp_processor_id+0x1c/0x20 [ 1403.449020] ? perf_trace_lock+0x14d/0x7a0 [ 1403.449042] should_fail.cold.4+0xa/0x17 [ 1403.449071] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1403.482768] ? debug_smp_processor_id+0x1c/0x20 [ 1403.482802] ? lock_is_held_type+0x210/0x210 [ 1403.496973] ? kasan_slab_alloc+0x12/0x20 [ 1403.501130] ? dup_fd+0x11c/0xf50 [ 1403.501146] ? unshare_files+0xab/0x2d0 [ 1403.501161] ? __do_execve_file.isra.33+0x360/0x25d0 [ 1403.501176] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1403.501197] ? find_held_lock+0x36/0x1c0 [ 1403.501233] ? perf_trace_sched_process_exec+0x860/0x860 [ 1403.514180] ? dup_fd+0xa42/0xf50 [ 1403.514222] __should_failslab+0x124/0x180 [ 1403.528589] should_failslab+0x9/0x14 [ 1403.528607] kmem_cache_alloc_trace+0x2d7/0x750 [ 1403.528627] ? do_raw_spin_unlock+0xa7/0x330 [ 1403.540117] ? do_raw_spin_trylock+0x270/0x270 [ 1403.540135] ? __lock_is_held+0xb5/0x140 [ 1403.540156] alloc_fdtable+0x89/0x280 [ 1403.549218] dup_fd+0xa71/0xf50 [ 1403.549244] ? __fdget+0x20/0x20 [ 1403.549282] ? is_bpf_text_address+0xac/0x170 [ 1403.549302] ? lock_downgrade+0x900/0x900 [ 1403.568361] ? check_preemption_disabled+0x48/0x280 [ 1403.568383] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1403.568404] ? kasan_check_read+0x11/0x20 [ 1403.577033] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1403.577056] ? rcu_softirq_qs+0x20/0x20 [ 1403.577073] ? rcu_softirq_qs+0x20/0x20 [ 1403.587056] ? unwind_dump+0x190/0x190 [ 1403.587098] unshare_fd+0x200/0x2c0 [ 1403.604445] ? mmdrop_async_fn+0x20/0x20 [ 1403.604465] ? unwind_get_return_address+0x61/0xa0 [ 1403.604487] ? __save_stack_trace+0x8d/0xf0 [ 1403.621004] unshare_files+0xab/0x2d0 [ 1403.621025] ? __ia32_sys_unshare+0x40/0x40 [ 1403.633456] ? save_stack+0x43/0xd0 [ 1403.633472] ? kasan_kmalloc+0xc7/0xe0 [ 1403.633492] ? kasan_slab_alloc+0x12/0x20 [ 1403.645142] ? kmem_cache_alloc+0x12e/0x730 [ 1403.649475] ? getname_flags+0xd0/0x590 [ 1403.649491] ? getname+0x19/0x20 [ 1403.649513] __do_execve_file.isra.33+0x360/0x25d0 [ 1403.656839] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1403.656858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1403.656880] ? prepare_bprm_creds+0x120/0x120 [ 1403.666983] ? usercopy_warn+0x110/0x110 [ 1403.667031] ? check_preemption_disabled+0x48/0x280 [ 1403.686162] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1403.686191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1403.697283] ? strncpy_from_user+0x411/0x5a0 [ 1403.701722] ? digsig_verify+0x1530/0x1530 [ 1403.705972] ? kmem_cache_alloc+0x33a/0x730 [ 1403.705992] ? do_fast_syscall_32+0x150/0xfb2 [ 1403.706016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1403.720351] ? getname_flags+0x26e/0x590 [ 1403.720368] ? trace_hardirqs_off_caller+0x310/0x310 [ 1403.720392] __ia32_compat_sys_execve+0x94/0xc0 [ 1403.720414] do_fast_syscall_32+0x34d/0xfb2 [ 1403.720434] ? do_int80_syscall_32+0x890/0x890 [ 1403.729587] ? entry_SYSENTER_compat+0x68/0x7f [ 1403.729606] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1403.729623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1403.729638] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1403.729654] ? trace_hardirqs_on_caller+0x310/0x310 [ 1403.729674] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1403.738656] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1403.738680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1403.738706] entry_SYSENTER_compat+0x70/0x7f [ 1403.738719] RIP: 0023:0xf7fbca29 [ 1403.738737] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1403.747878] RSP: 002b:00000000f5fb80cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1403.747894] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1403.747903] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1403.747912] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1403.747921] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1403.747930] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:22 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa603]}, 0x2c) 18:30:22 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080045007, &(0x7f0000000040)=0x7) 18:30:22 executing program 2 (fault-call:9 fault-nth:4): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:22 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @empty}, &(0x7f0000000100)=0xc) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:22 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0045009, &(0x7f0000000040)=0x7) [ 1404.041740] IPVS: ftp: loaded support on port[0] = 21 [ 1404.049402] FAULT_INJECTION: forcing a failure. [ 1404.049402] name failslab, interval 1, probability 0, space 0, times 0 18:30:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x2c) 18:30:22 executing program 2 (fault-call:9 fault-nth:5): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1404.097312] CPU: 0 PID: 407 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1404.104542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.104555] Call Trace: [ 1404.104579] dump_stack+0x244/0x39d [ 1404.104602] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1404.125351] ? debug_smp_processor_id+0x1c/0x20 [ 1404.130032] ? perf_trace_lock+0x14d/0x7a0 [ 1404.130060] should_fail.cold.4+0xa/0x17 [ 1404.130081] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1404.130106] ? unwind_get_return_address+0x61/0xa0 [ 1404.130132] ? __save_stack_trace+0x8d/0xf0 [ 1404.152792] ? save_stack+0xa9/0xd0 [ 1404.152815] ? find_held_lock+0x36/0x1c0 [ 1404.160511] ? perf_trace_sched_process_exec+0x860/0x860 [ 1404.160530] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1404.160568] __should_failslab+0x124/0x180 [ 1404.175781] should_failslab+0x9/0x14 [ 1404.179600] kmem_cache_alloc_node_trace+0x270/0x740 [ 1404.184722] ? kasan_unpoison_shadow+0x35/0x50 [ 1404.189330] __kmalloc_node+0x3c/0x70 [ 1404.193147] kvmalloc_node+0x65/0xf0 18:30:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1404.193167] alloc_fdtable+0x145/0x280 [ 1404.193194] dup_fd+0xa71/0xf50 [ 1404.204134] ? __fdget+0x20/0x20 [ 1404.207522] ? is_bpf_text_address+0xac/0x170 [ 1404.212043] ? lock_downgrade+0x900/0x900 [ 1404.216215] ? check_preemption_disabled+0x48/0x280 [ 1404.221257] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1404.221285] ? kasan_check_read+0x11/0x20 [ 1404.221300] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1404.221321] ? rcu_softirq_qs+0x20/0x20 [ 1404.230433] ? rcu_softirq_qs+0x20/0x20 [ 1404.230447] ? unwind_dump+0x190/0x190 18:30:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1300000000000000]}, 0x2c) [ 1404.230469] unshare_fd+0x200/0x2c0 [ 1404.230485] ? mmdrop_async_fn+0x20/0x20 [ 1404.230502] ? unwind_get_return_address+0x61/0xa0 [ 1404.230523] ? __save_stack_trace+0x8d/0xf0 [ 1404.260216] unshare_files+0xab/0x2d0 [ 1404.260237] ? __ia32_sys_unshare+0x40/0x40 [ 1404.272678] ? save_stack+0x43/0xd0 [ 1404.276323] ? kasan_kmalloc+0xc7/0xe0 [ 1404.280220] ? kasan_slab_alloc+0x12/0x20 [ 1404.284381] ? kmem_cache_alloc+0x12e/0x730 [ 1404.288730] ? getname_flags+0xd0/0x590 [ 1404.292716] ? getname+0x19/0x20 [ 1404.292739] __do_execve_file.isra.33+0x360/0x25d0 [ 1404.292769] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1404.292787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1404.292817] ? prepare_bprm_creds+0x120/0x120 [ 1404.301117] ? usercopy_warn+0x110/0x110 [ 1404.301147] ? check_preemption_disabled+0x48/0x280 [ 1404.301173] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1404.325424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1404.325444] ? strncpy_from_user+0x411/0x5a0 [ 1404.325471] ? digsig_verify+0x1530/0x1530 [ 1404.325492] ? kmem_cache_alloc+0x33a/0x730 [ 1404.349539] ? do_fast_syscall_32+0x150/0xfb2 [ 1404.354061] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1404.354085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1404.354103] ? getname_flags+0x26e/0x590 [ 1404.354124] ? trace_hardirqs_off_caller+0x310/0x310 [ 1404.373404] __ia32_compat_sys_execve+0x94/0xc0 [ 1404.378092] do_fast_syscall_32+0x34d/0xfb2 [ 1404.378116] ? do_int80_syscall_32+0x890/0x890 [ 1404.378135] ? entry_SYSENTER_compat+0x68/0x7f [ 1404.378153] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1404.378168] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.378184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.378199] ? trace_hardirqs_on_caller+0x310/0x310 [ 1404.378215] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1404.378234] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1404.378256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.378290] entry_SYSENTER_compat+0x70/0x7f [ 1404.378310] RIP: 0023:0xf7fbca29 [ 1404.402004] FAULT_INJECTION: forcing a failure. [ 1404.402004] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.406447] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1404.406457] RSP: 002b:00000000f5fb80cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1404.406473] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1404.406483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1404.406492] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 18:30:23 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080045006, &(0x7f0000000040)=0x7) [ 1404.406501] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1404.406509] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1404.659785] CPU: 1 PID: 427 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1404.667037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.676425] Call Trace: [ 1404.679050] dump_stack+0x244/0x39d [ 1404.682701] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1404.687924] ? debug_smp_processor_id+0x1c/0x20 [ 1404.692608] ? perf_trace_lock+0x14d/0x7a0 [ 1404.696864] should_fail.cold.4+0xa/0x17 [ 1404.700948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1404.706103] ? unwind_get_return_address+0x61/0xa0 [ 1404.711057] ? __save_stack_trace+0x8d/0xf0 [ 1404.715417] ? save_stack+0xa9/0xd0 [ 1404.719081] ? find_held_lock+0x36/0x1c0 [ 1404.723182] ? perf_trace_sched_process_exec+0x860/0x860 [ 1404.723203] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1404.723232] __should_failslab+0x124/0x180 [ 1404.738458] should_failslab+0x9/0x14 [ 1404.742289] kmem_cache_alloc_node_trace+0x270/0x740 [ 1404.747412] ? kasan_unpoison_shadow+0x35/0x50 [ 1404.752020] __kmalloc_node+0x3c/0x70 [ 1404.755846] kvmalloc_node+0x65/0xf0 [ 1404.759589] alloc_fdtable+0x145/0x280 [ 1404.763491] dup_fd+0xa71/0xf50 [ 1404.766811] ? __fdget+0x20/0x20 [ 1404.770204] ? is_bpf_text_address+0xac/0x170 [ 1404.774730] ? lock_downgrade+0x900/0x900 [ 1404.778892] ? check_preemption_disabled+0x48/0x280 [ 1404.783932] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1404.788876] ? kasan_check_read+0x11/0x20 [ 1404.793035] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1404.798335] ? rcu_softirq_qs+0x20/0x20 [ 1404.802322] ? rcu_softirq_qs+0x20/0x20 [ 1404.806317] ? unwind_dump+0x190/0x190 [ 1404.810231] unshare_fd+0x200/0x2c0 [ 1404.813874] ? mmdrop_async_fn+0x20/0x20 [ 1404.817950] ? unwind_get_return_address+0x61/0xa0 [ 1404.817971] ? __save_stack_trace+0x8d/0xf0 [ 1404.817998] unshare_files+0xab/0x2d0 [ 1404.818019] ? __ia32_sys_unshare+0x40/0x40 [ 1404.818039] ? save_stack+0x43/0xd0 [ 1404.818062] ? kasan_kmalloc+0xc7/0xe0 [ 1404.818078] ? kasan_slab_alloc+0x12/0x20 [ 1404.818099] ? kmem_cache_alloc+0x12e/0x730 [ 1404.842960] ? getname_flags+0xd0/0x590 [ 1404.842977] ? getname+0x19/0x20 [ 1404.843001] __do_execve_file.isra.33+0x360/0x25d0 [ 1404.843025] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1404.868931] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1404.874496] ? prepare_bprm_creds+0x120/0x120 [ 1404.879012] ? usercopy_warn+0x110/0x110 [ 1404.883108] ? check_preemption_disabled+0x48/0x280 [ 1404.883136] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1404.893688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1404.899244] ? strncpy_from_user+0x411/0x5a0 [ 1404.903691] ? digsig_verify+0x1530/0x1530 [ 1404.907941] ? kmem_cache_alloc+0x33a/0x730 [ 1404.912303] ? do_fast_syscall_32+0x150/0xfb2 [ 1404.916825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1404.922383] ? getname_flags+0x26e/0x590 [ 1404.926460] ? trace_hardirqs_off_caller+0x310/0x310 [ 1404.931587] __ia32_compat_sys_execve+0x94/0xc0 [ 1404.931612] do_fast_syscall_32+0x34d/0xfb2 [ 1404.931640] ? do_int80_syscall_32+0x890/0x890 [ 1404.945206] ? entry_SYSENTER_compat+0x68/0x7f [ 1404.949827] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1404.954863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.959721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.964578] ? trace_hardirqs_on_caller+0x310/0x310 [ 1404.969613] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1404.974677] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1404.979712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1404.979740] entry_SYSENTER_compat+0x70/0x7f [ 1404.979754] RIP: 0023:0xf7fbca29 [ 1404.979773] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1404.989006] RSP: 002b:00000000f5f970cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1404.989022] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1404.989031] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1404.989040] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1404.989057] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1404.989066] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1405.095053] IPVS: ftp: loaded support on port[0] = 21 18:30:24 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8902, 0x103000) ioctl$TCFLSH(r1, 0x540b, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0xfffffffffffffff8) 18:30:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x700]}, 0x2c) 18:30:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x800040c0045005, &(0x7f0000000040)=0x7) 18:30:24 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1006, 0x2) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:24 executing program 2 (fault-call:9 fault-nth:6): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1202]}, 0x2c) 18:30:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004000005460, &(0x7f0000000040)=0x7) [ 1405.450728] FAULT_INJECTION: forcing a failure. [ 1405.450728] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.483838] IPVS: ftp: loaded support on port[0] = 21 [ 1405.508473] CPU: 1 PID: 454 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1405.515713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.525090] Call Trace: [ 1405.527708] dump_stack+0x244/0x39d [ 1405.531366] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1405.536586] ? debug_smp_processor_id+0x1c/0x20 [ 1405.541292] ? perf_trace_lock+0x14d/0x7a0 [ 1405.545546] should_fail.cold.4+0xa/0x17 [ 1405.545571] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1405.545590] ? zap_class+0x640/0x640 [ 1405.545618] ? is_bpf_text_address+0xac/0x170 [ 1405.545637] ? lock_downgrade+0x900/0x900 [ 1405.545659] ? check_preemption_disabled+0x48/0x280 [ 1405.572222] ? find_held_lock+0x36/0x1c0 [ 1405.576338] ? perf_trace_sched_process_exec+0x860/0x860 [ 1405.581812] ? __save_stack_trace+0x8d/0xf0 [ 1405.581842] __should_failslab+0x124/0x180 [ 1405.581862] should_failslab+0x9/0x14 [ 1405.581880] kmem_cache_alloc_trace+0x2d7/0x750 [ 1405.581897] ? save_stack+0x43/0xd0 [ 1405.581913] ? kasan_kmalloc+0xc7/0xe0 [ 1405.581933] ? kasan_slab_alloc+0x12/0x20 [ 1405.610611] ? kmem_cache_alloc+0x12e/0x730 [ 1405.614955] ? getname_flags+0xd0/0x590 [ 1405.618943] ? getname+0x19/0x20 [ 1405.622346] __do_execve_file.isra.33+0x425/0x25d0 [ 1405.627310] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1405.632512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1405.632538] ? prepare_bprm_creds+0x120/0x120 [ 1405.632568] ? usercopy_warn+0x110/0x110 [ 1405.646664] ? check_preemption_disabled+0x48/0x280 [ 1405.651703] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1405.651729] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1405.651749] ? strncpy_from_user+0x411/0x5a0 [ 1405.651777] ? digsig_verify+0x1530/0x1530 [ 1405.651798] ? kmem_cache_alloc+0x33a/0x730 [ 1405.662881] ? do_fast_syscall_32+0x150/0xfb2 [ 1405.662909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1405.662927] ? getname_flags+0x26e/0x590 [ 1405.662944] ? trace_hardirqs_off_caller+0x310/0x310 [ 1405.662967] __ia32_compat_sys_execve+0x94/0xc0 [ 1405.685931] do_fast_syscall_32+0x34d/0xfb2 [ 1405.685955] ? do_int80_syscall_32+0x890/0x890 18:30:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf602]}, 0x2c) 18:30:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2a03000000000000]}, 0x2c) 18:30:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x2c) [ 1405.685976] ? entry_SYSENTER_compat+0x68/0x7f [ 1405.704112] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1405.704132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1405.704148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1405.704170] ? trace_hardirqs_on_caller+0x310/0x310 [ 1405.718491] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1405.718511] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1405.718536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1405.718563] entry_SYSENTER_compat+0x70/0x7f [ 1405.718577] RIP: 0023:0xf7fbca29 [ 1405.718595] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1405.718609] RSP: 002b:00000000f5f970cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1405.728293] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1405.728303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1405.728321] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 18:30:24 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1405.728331] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1405.728341] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:25 executing program 0: unshare(0x6c060000) socket$kcm(0x29, 0x5, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004080045005, &(0x7f0000000040)=0x7) 18:30:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2002000000000000]}, 0x2c) 18:30:25 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:25 executing program 2 (fault-call:9 fault-nth:7): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1406.401148] FAULT_INJECTION: forcing a failure. [ 1406.401148] name failslab, interval 1, probability 0, space 0, times 0 18:30:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1406.448231] IPVS: ftp: loaded support on port[0] = 21 18:30:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3d0]}, 0x2c) [ 1406.544183] CPU: 1 PID: 491 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1406.551422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.560807] Call Trace: [ 1406.563416] dump_stack+0x244/0x39d [ 1406.567073] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1406.572294] ? debug_smp_processor_id+0x1c/0x20 [ 1406.577252] ? perf_trace_lock+0x14d/0x7a0 [ 1406.581519] should_fail.cold.4+0xa/0x17 [ 1406.585602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1406.590734] ? __mutex_lock+0x85e/0x16f0 [ 1406.594813] ? zap_class+0x640/0x640 [ 1406.598556] ? find_held_lock+0x36/0x1c0 [ 1406.602641] ? __lock_is_held+0xb5/0x140 [ 1406.606737] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1406.612295] ? perf_trace_sched_process_exec+0x860/0x860 [ 1406.617765] ? creds_are_invalid+0x140/0x140 [ 1406.622192] __should_failslab+0x124/0x180 [ 1406.626442] should_failslab+0x9/0x14 [ 1406.630247] kmem_cache_alloc+0x2be/0x730 [ 1406.634421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1406.639972] ? check_preemption_disabled+0x48/0x280 [ 1406.645013] prepare_creds+0xab/0x4d0 [ 1406.648834] ? abort_creds+0x2a0/0x2a0 [ 1406.652746] ? __do_execve_file.isra.33+0x425/0x25d0 [ 1406.657908] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1406.662954] prepare_exec_creds+0x11/0xf0 [ 1406.667129] prepare_bprm_creds+0x70/0x120 [ 1406.667149] __do_execve_file.isra.33+0x445/0x25d0 [ 1406.667169] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1406.667196] ? prepare_bprm_creds+0x120/0x120 [ 1406.667215] ? usercopy_warn+0x110/0x110 [ 1406.667246] ? check_preemption_disabled+0x48/0x280 [ 1406.667283] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1406.667304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1406.706266] ? strncpy_from_user+0x411/0x5a0 [ 1406.710706] ? digsig_verify+0x1530/0x1530 [ 1406.714950] ? kmem_cache_alloc+0x33a/0x730 [ 1406.719313] ? do_fast_syscall_32+0x150/0xfb2 [ 1406.723836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1406.729396] ? getname_flags+0x26e/0x590 [ 1406.733470] ? trace_hardirqs_off_caller+0x310/0x310 [ 1406.738593] __ia32_compat_sys_execve+0x94/0xc0 18:30:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x71]}, 0x2c) 18:30:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x13]}, 0x2c) 18:30:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1406.743290] do_fast_syscall_32+0x34d/0xfb2 [ 1406.747630] ? do_int80_syscall_32+0x890/0x890 [ 1406.752233] ? entry_SYSENTER_compat+0x68/0x7f [ 1406.756841] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1406.761867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1406.766719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1406.771571] ? trace_hardirqs_on_caller+0x310/0x310 [ 1406.776609] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1406.781645] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1406.786681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1406.791541] entry_SYSENTER_compat+0x70/0x7f [ 1406.791555] RIP: 0023:0xf7fbca29 [ 1406.791571] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1406.791580] RSP: 002b:00000000f5fb80cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1406.791596] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1406.791605] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1406.791615] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1406.791624] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1406.791633] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:26 executing program 0: unshare(0x6c060000) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200000, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x1f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:26 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045002, &(0x7f0000000040)=0x7) 18:30:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x2c) 18:30:26 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8020fa9f6e5739a8e8b6b736c986636b9f433b15d8"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x7}, &(0x7f00000001c0)=0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:26 executing program 2 (fault-call:9 fault-nth:8): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) [ 1407.468769] FAULT_INJECTION: forcing a failure. [ 1407.468769] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.504376] IPVS: ftp: loaded support on port[0] = 21 18:30:26 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x3) [ 1407.600023] CPU: 1 PID: 535 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1407.607296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.616657] Call Trace: [ 1407.616688] dump_stack+0x244/0x39d [ 1407.616725] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1407.616758] ? debug_smp_processor_id+0x1c/0x20 [ 1407.632831] ? perf_trace_lock+0x14d/0x7a0 [ 1407.637098] should_fail.cold.4+0xa/0x17 [ 1407.641187] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1407.641204] ? perf_trace_lock+0x14d/0x7a0 [ 1407.641225] ? print_usage_bug+0xc0/0xc0 [ 1407.641251] ? lock_is_held_type+0x210/0x210 [ 1407.650598] ? zap_class+0x640/0x640 [ 1407.650635] ? find_held_lock+0x36/0x1c0 [ 1407.650657] ? __lock_is_held+0xb5/0x140 [ 1407.670973] ? perf_trace_sched_process_exec+0x860/0x860 [ 1407.676452] ? check_preemption_disabled+0x48/0x280 [ 1407.681483] ? __lock_acquire+0x62f/0x4c20 [ 1407.685746] __should_failslab+0x124/0x180 [ 1407.690002] should_failslab+0x9/0x14 [ 1407.693813] kmem_cache_alloc+0x2be/0x730 [ 1407.693835] ? lock_is_held_type+0x210/0x210 [ 1407.693853] ? mark_held_locks+0x130/0x130 [ 1407.693878] __alloc_file+0xa8/0x470 [ 1407.693893] ? lock_is_held_type+0x210/0x210 [ 1407.693912] ? file_free_rcu+0xd0/0xd0 [ 1407.718700] ? __lock_acquire+0x62f/0x4c20 [ 1407.722960] ? find_held_lock+0x36/0x1c0 [ 1407.727056] alloc_empty_file+0x72/0x170 [ 1407.731149] path_openat+0x170/0x5150 [ 1407.734985] ? lock_downgrade+0x900/0x900 [ 1407.735005] ? check_preemption_disabled+0x48/0x280 [ 1407.735026] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1407.735051] ? kasan_check_read+0x11/0x20 [ 1407.735069] ? print_usage_bug+0xc0/0xc0 [ 1407.735087] ? print_usage_bug+0xc0/0xc0 [ 1407.735104] ? rcu_softirq_qs+0x20/0x20 [ 1407.765433] ? unwind_dump+0x190/0x190 [ 1407.769342] ? path_lookupat.isra.43+0xc00/0xc00 [ 1407.774119] ? is_bpf_text_address+0xd3/0x170 [ 1407.778634] ? kernel_text_address+0x79/0xf0 [ 1407.778664] ? __lock_acquire+0x62f/0x4c20 [ 1407.778703] ? mark_held_locks+0x130/0x130 [ 1407.778720] ? kasan_kmalloc+0xc7/0xe0 [ 1407.778735] ? kasan_slab_alloc+0x12/0x20 [ 1407.778750] ? kmem_cache_alloc+0x12e/0x730 [ 1407.778764] ? prepare_creds+0xab/0x4d0 [ 1407.778783] ? prepare_exec_creds+0x11/0xf0 [ 1407.796318] ? prepare_bprm_creds+0x70/0x120 [ 1407.804769] ? __do_execve_file.isra.33+0x445/0x25d0 [ 1407.804786] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1407.804804] ? do_fast_syscall_32+0x34d/0xfb2 [ 1407.804821] ? entry_SYSENTER_compat+0x70/0x7f [ 1407.804844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1407.804864] ? check_preemption_disabled+0x48/0x280 [ 1407.804880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1407.804902] ? debug_smp_processor_id+0x1c/0x20 [ 1407.822681] ? perf_trace_lock+0x14d/0x7a0 [ 1407.822701] ? debug_smp_processor_id+0x1c/0x20 [ 1407.822718] ? perf_trace_lock+0x14d/0x7a0 [ 1407.822743] do_filp_open+0x255/0x380 [ 1407.822761] ? may_open_dev+0x100/0x100 [ 1407.822781] ? zap_class+0x640/0x640 [ 1407.822800] ? zap_class+0x640/0x640 [ 1407.885780] ? apparmor_cred_prepare+0x30c/0x5a0 [ 1407.885803] ? apparmor_task_free+0x1e0/0x1e0 [ 1407.885829] ? find_held_lock+0x36/0x1c0 [ 1407.885855] do_open_execat+0x221/0x8e0 [ 1407.885873] ? __do_execve_file.isra.33+0x8a4/0x25d0 [ 1407.885893] ? unregister_binfmt+0x2a0/0x2a0 [ 1407.912686] ? check_preemption_disabled+0x48/0x280 [ 1407.917751] ? kasan_check_read+0x11/0x20 [ 1407.921930] ? do_raw_spin_trylock+0x270/0x270 [ 1407.926525] ? key_put+0x33/0x80 [ 1407.929909] __do_execve_file.isra.33+0x176f/0x25d0 [ 1407.934951] ? prepare_bprm_creds+0x120/0x120 [ 1407.939460] ? usercopy_warn+0x110/0x110 [ 1407.943541] ? check_preemption_disabled+0x48/0x280 [ 1407.948576] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1407.954130] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1407.959674] ? strncpy_from_user+0x411/0x5a0 [ 1407.964102] ? digsig_verify+0x1530/0x1530 [ 1407.968345] ? kmem_cache_alloc+0x33a/0x730 [ 1407.972677] ? do_fast_syscall_32+0x150/0xfb2 [ 1407.977184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1407.982736] ? getname_flags+0x26e/0x590 [ 1407.986802] ? trace_hardirqs_off_caller+0x310/0x310 [ 1407.991915] __ia32_compat_sys_execve+0x94/0xc0 [ 1407.996600] do_fast_syscall_32+0x34d/0xfb2 [ 1408.000931] ? do_int80_syscall_32+0x890/0x890 [ 1408.005534] ? entry_SYSENTER_compat+0x68/0x7f [ 1408.010130] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1408.015151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1408.019999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1408.024849] ? trace_hardirqs_on_caller+0x310/0x310 [ 1408.029870] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1408.034894] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1408.039921] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1408.044823] entry_SYSENTER_compat+0x70/0x7f [ 1408.049233] RIP: 0023:0xf7fbca29 [ 1408.052608] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1408.071523] RSP: 002b:00000000f5f970cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1408.079239] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1408.086516] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1408.093790] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 18:30:26 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0xa) 18:30:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x18000000]}, 0x2c) [ 1408.101074] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1408.108341] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:27 executing program 0: unshare(0x6c060000) epoll_create(0x8) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000, 0x1018, 0x23a5, {"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"}}, {0x0, "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"}}, &(0x7f00000012c0)=""/243, 0x1115, 0xf3}, 0x20) mmap(&(0x7f000056f000/0x1000)=nil, 0x1000, 0xf, 0x8031, r0, 0x200000000) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x8042, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) 18:30:27 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff80e8011b837f850b97a5938dc2da77feebe16ea35343a6803cc63316dd8b66631d13ae3fc56538baf64699e90a76a194e3d99f341b0dc5a3476d7cce48af0107c493af879eaf72cd1678b05b935787e4999493e20d2b5f2b4f5545f62fda4d8884ce2acaacd0fce3071d1b5e2c93497eec6814654a47cd53bc0801592a825335e934b6a40e48640209adc640a89a81a43caa1495356b5c7fb8e310cdac8d4651ad66d0e7b701c0589dfa46ea20103c919e55c75e963d81a5ece95fda417e4ac3eb853a9b3aa495e3c8"], 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0xb) 18:30:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x12000000]}, 0x2c) 18:30:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:27 executing program 2 (fault-call:9 fault-nth:9): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xdf030000]}, 0x2c) 18:30:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1408.873533] IPVS: ftp: loaded support on port[0] = 21 18:30:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x35) 18:30:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1403]}, 0x2c) 18:30:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1409.091443] FAULT_INJECTION: forcing a failure. [ 1409.091443] name failslab, interval 1, probability 0, space 0, times 0 18:30:27 executing program 0: unshare(0x6c060000) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x2000, 0xa0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x100000000, 0x8}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0xf1a7, 0x6}, &(0x7f00000001c0)=0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8000000000008031, r0, 0x8000) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 1409.152734] CPU: 0 PID: 587 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1409.159974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.169333] Call Trace: [ 1409.171949] dump_stack+0x244/0x39d [ 1409.175611] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1409.180832] ? debug_smp_processor_id+0x1c/0x20 [ 1409.185518] ? perf_trace_lock+0x14d/0x7a0 [ 1409.189781] should_fail.cold.4+0xa/0x17 [ 1409.193862] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1409.198988] ? is_bpf_text_address+0xd3/0x170 [ 1409.203496] ? kernel_text_address+0x79/0xf0 [ 1409.207919] ? zap_class+0x640/0x640 [ 1409.211643] ? unwind_get_return_address+0x61/0xa0 [ 1409.216588] ? __save_stack_trace+0x8d/0xf0 [ 1409.220932] ? find_held_lock+0x36/0x1c0 [ 1409.225013] ? __lock_is_held+0xb5/0x140 [ 1409.229102] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1409.233952] ? perf_trace_sched_process_exec+0x860/0x860 [ 1409.239428] __should_failslab+0x124/0x180 [ 1409.243684] should_failslab+0x9/0x14 [ 1409.247498] kmem_cache_alloc_trace+0x2d7/0x750 [ 1409.252190] ? __might_sleep+0x95/0x190 [ 1409.256185] apparmor_file_alloc_security+0x17b/0xac0 [ 1409.261396] ? apparmor_path_rename+0xcd0/0xcd0 [ 1409.266107] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1409.271144] ? kmem_cache_alloc+0x33a/0x730 [ 1409.275488] security_file_alloc+0x4c/0xa0 [ 1409.279741] __alloc_file+0x12a/0x470 [ 1409.283561] ? lock_is_held_type+0x1d0/0x210 [ 1409.285786] IPVS: ftp: loaded support on port[0] = 21 [ 1409.287979] ? file_free_rcu+0xd0/0xd0 [ 1409.287996] ? print_usage_bug+0xc0/0xc0 [ 1409.288023] ? __lock_acquire+0x62f/0x4c20 [ 1409.288047] ? find_held_lock+0x36/0x1c0 [ 1409.288070] alloc_empty_file+0x72/0x170 [ 1409.309496] path_openat+0x170/0x5150 [ 1409.309516] ? lock_downgrade+0x900/0x900 [ 1409.309538] ? check_preemption_disabled+0x48/0x280 [ 1409.326552] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1409.331498] ? kasan_check_read+0x11/0x20 [ 1409.335658] ? print_usage_bug+0xc0/0xc0 [ 1409.339734] ? print_usage_bug+0xc0/0xc0 [ 1409.343823] ? rcu_softirq_qs+0x20/0x20 [ 1409.343838] ? unwind_dump+0x190/0x190 [ 1409.343860] ? path_lookupat.isra.43+0xc00/0xc00 [ 1409.343883] ? is_bpf_text_address+0xd3/0x170 [ 1409.360973] ? kernel_text_address+0x79/0xf0 [ 1409.365404] ? __lock_acquire+0x62f/0x4c20 [ 1409.369665] ? mark_held_locks+0x130/0x130 [ 1409.369683] ? kasan_kmalloc+0xc7/0xe0 [ 1409.369703] ? kasan_slab_alloc+0x12/0x20 [ 1409.378123] ? kmem_cache_alloc+0x12e/0x730 [ 1409.378138] ? prepare_creds+0xab/0x4d0 [ 1409.378153] ? prepare_exec_creds+0x11/0xf0 [ 1409.378167] ? prepare_bprm_creds+0x70/0x120 [ 1409.378184] ? __do_execve_file.isra.33+0x445/0x25d0 [ 1409.378198] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1409.378214] ? do_fast_syscall_32+0x34d/0xfb2 [ 1409.378227] ? entry_SYSENTER_compat+0x70/0x7f [ 1409.378249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1409.378281] ? check_preemption_disabled+0x48/0x280 [ 1409.399406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1409.423950] ? debug_smp_processor_id+0x1c/0x20 [ 1409.423968] ? perf_trace_lock+0x14d/0x7a0 [ 1409.423989] ? debug_smp_processor_id+0x1c/0x20 [ 1409.448081] ? perf_trace_lock+0x14d/0x7a0 [ 1409.452344] do_filp_open+0x255/0x380 [ 1409.456157] ? may_open_dev+0x100/0x100 [ 1409.456180] ? zap_class+0x640/0x640 [ 1409.456197] ? zap_class+0x640/0x640 [ 1409.456217] ? apparmor_cred_prepare+0x30c/0x5a0 [ 1409.472392] ? apparmor_task_free+0x1e0/0x1e0 [ 1409.476906] ? find_held_lock+0x36/0x1c0 [ 1409.480984] do_open_execat+0x221/0x8e0 [ 1409.484978] ? __do_execve_file.isra.33+0x8a4/0x25d0 [ 1409.490096] ? unregister_binfmt+0x2a0/0x2a0 [ 1409.490116] ? check_preemption_disabled+0x48/0x280 [ 1409.490139] ? kasan_check_read+0x11/0x20 [ 1409.490158] ? do_raw_spin_trylock+0x270/0x270 [ 1409.490178] ? key_put+0x33/0x80 [ 1409.490202] __do_execve_file.isra.33+0x176f/0x25d0 [ 1409.517009] ? prepare_bprm_creds+0x120/0x120 [ 1409.517030] ? usercopy_warn+0x110/0x110 [ 1409.517058] ? trace_hardirqs_on+0x310/0x310 [ 1409.530050] ? check_preemption_disabled+0x48/0x280 [ 1409.535096] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1409.540671] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1409.546222] ? strncpy_from_user+0x411/0x5a0 [ 1409.550651] ? digsig_verify+0x1530/0x1530 [ 1409.554907] ? kmem_cache_alloc+0x33a/0x730 [ 1409.559252] ? do_fast_syscall_32+0x150/0xfb2 [ 1409.563777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1409.563798] ? getname_flags+0x26e/0x590 [ 1409.563815] ? trace_hardirqs_off_caller+0x310/0x310 [ 1409.563838] __ia32_compat_sys_execve+0x94/0xc0 [ 1409.583193] do_fast_syscall_32+0x34d/0xfb2 [ 1409.587533] ? do_int80_syscall_32+0x890/0x890 [ 1409.592145] ? entry_SYSENTER_compat+0x68/0x7f [ 1409.596744] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1409.601771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1409.601787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1409.601805] ? trace_hardirqs_on_caller+0x310/0x310 [ 1409.601824] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1409.601843] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1409.601867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1409.601890] entry_SYSENTER_compat+0x70/0x7f [ 1409.635813] RIP: 0023:0xf7fbca29 18:30:28 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(r0, r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socketpair(0x8, 0xf, 0x101, &(0x7f0000000100)) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080), 0x10) 18:30:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x14020000]}, 0x2c) 18:30:28 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x14) 18:30:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1409.635832] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1409.635842] RSP: 002b:00000000f5fb80cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1409.635858] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1409.635872] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1409.673093] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1409.673103] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1409.673112] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:28 executing program 2 (fault-call:9 fault-nth:10): sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3c2]}, 0x2c) 18:30:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:28 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x10) 18:30:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc6030000]}, 0x2c) [ 1409.951380] FAULT_INJECTION: forcing a failure. [ 1409.951380] name failslab, interval 1, probability 0, space 0, times 0 18:30:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa6030000]}, 0x2c) 18:30:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1410.175182] CPU: 0 PID: 623 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #265 [ 1410.182435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.191814] Call Trace: [ 1410.194423] dump_stack+0x244/0x39d [ 1410.198063] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1410.203309] ? debug_smp_processor_id+0x1c/0x20 [ 1410.206921] IPVS: ftp: loaded support on port[0] = 21 [ 1410.208014] ? perf_trace_lock+0x14d/0x7a0 [ 1410.208038] should_fail.cold.4+0xa/0x17 [ 1410.208060] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1410.208088] ? save_stack+0x43/0xd0 [ 1410.208103] ? kasan_kmalloc+0xc7/0xe0 [ 1410.208118] ? kmem_cache_alloc_trace+0x152/0x750 [ 1410.208139] ? alloc_pipe_info+0x164/0x5d0 [ 1410.221642] ? zap_class+0x640/0x640 [ 1410.230351] ? path_openat+0x12bc/0x5150 [ 1410.230367] ? do_open_execat+0x221/0x8e0 [ 1410.230380] ? __do_execve_file.isra.33+0x176f/0x25d0 [ 1410.230395] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1410.230412] ? do_fast_syscall_32+0x34d/0xfb2 [ 1410.230427] ? entry_SYSENTER_compat+0x70/0x7f [ 1410.230447] ? find_held_lock+0x36/0x1c0 [ 1410.265321] ? __lock_is_held+0xb5/0x140 [ 1410.265354] ? perf_trace_sched_process_exec+0x860/0x860 [ 1410.288007] __should_failslab+0x124/0x180 [ 1410.288043] should_failslab+0x9/0x14 [ 1410.288059] __kmalloc+0x2e0/0x760 [ 1410.288078] ? kmem_cache_alloc_trace+0x353/0x750 [ 1410.304492] ? alloc_pipe_info+0x2ce/0x5d0 [ 1410.308748] alloc_pipe_info+0x2ce/0x5d0 [ 1410.312821] ? pipe_read+0x940/0x940 [ 1410.316570] ? kasan_check_read+0x11/0x20 [ 1410.320740] ? do_raw_spin_trylock+0x270/0x270 [ 1410.325338] ? fsnotify+0xef0/0xef0 [ 1410.328987] ? do_raw_spin_trylock+0x270/0x270 [ 1410.333619] fifo_open+0x20d/0xad0 [ 1410.333658] do_dentry_open+0x499/0x1250 [ 1410.341301] ? kasan_check_read+0x11/0x20 [ 1410.345465] ? pipe_release+0x270/0x270 [ 1410.349460] ? chown_common+0x730/0x730 [ 1410.353467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.359019] ? security_inode_permission+0xd2/0x100 [ 1410.364052] ? inode_permission+0xb2/0x560 [ 1410.368313] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1410.373524] vfs_open+0xa0/0xd0 [ 1410.376871] path_openat+0x12bc/0x5150 [ 1410.380779] ? lock_downgrade+0x900/0x900 [ 1410.384956] ? check_preemption_disabled+0x48/0x280 [ 1410.390003] ? path_lookupat.isra.43+0xc00/0xc00 [ 1410.394774] ? is_bpf_text_address+0xd3/0x170 [ 1410.399305] ? kernel_text_address+0x79/0xf0 [ 1410.403738] ? __lock_acquire+0x62f/0x4c20 [ 1410.408036] ? mark_held_locks+0x130/0x130 [ 1410.412296] ? kasan_kmalloc+0xc7/0xe0 [ 1410.416195] ? kasan_slab_alloc+0x12/0x20 [ 1410.420354] ? kmem_cache_alloc+0x12e/0x730 [ 1410.424688] ? prepare_creds+0xab/0x4d0 [ 1410.428667] ? prepare_exec_creds+0x11/0xf0 [ 1410.428683] ? prepare_bprm_creds+0x70/0x120 [ 1410.428697] ? __do_execve_file.isra.33+0x445/0x25d0 [ 1410.428713] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1410.428733] ? do_fast_syscall_32+0x34d/0xfb2 [ 1410.437460] ? entry_SYSENTER_compat+0x70/0x7f [ 1410.451891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.451911] ? check_preemption_disabled+0x48/0x280 [ 1410.451925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.451945] ? debug_smp_processor_id+0x1c/0x20 [ 1410.462114] ? perf_trace_lock+0x14d/0x7a0 [ 1410.462130] ? debug_smp_processor_id+0x1c/0x20 [ 1410.462145] ? perf_trace_lock+0x14d/0x7a0 [ 1410.462168] do_filp_open+0x255/0x380 [ 1410.462185] ? may_open_dev+0x100/0x100 [ 1410.462205] ? zap_class+0x640/0x640 [ 1410.462225] ? apparmor_cred_prepare+0x30c/0x5a0 [ 1410.462246] ? apparmor_task_free+0x1e0/0x1e0 [ 1410.462268] ? find_held_lock+0x36/0x1c0 [ 1410.462302] do_open_execat+0x221/0x8e0 [ 1410.462320] ? __do_execve_file.isra.33+0x8a4/0x25d0 [ 1410.462340] ? unregister_binfmt+0x2a0/0x2a0 [ 1410.462356] ? check_preemption_disabled+0x48/0x280 [ 1410.462378] ? kasan_check_read+0x11/0x20 [ 1410.462396] ? do_raw_spin_trylock+0x270/0x270 [ 1410.462415] ? key_put+0x33/0x80 [ 1410.462441] __do_execve_file.isra.33+0x176f/0x25d0 [ 1410.462471] ? prepare_bprm_creds+0x120/0x120 [ 1410.462490] ? usercopy_warn+0x110/0x110 [ 1410.462517] ? check_preemption_disabled+0x48/0x280 [ 1410.462551] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1410.462575] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1410.462593] ? strncpy_from_user+0x411/0x5a0 [ 1410.462620] ? digsig_verify+0x1530/0x1530 [ 1410.462634] ? kmem_cache_alloc+0x33a/0x730 [ 1410.462653] ? do_fast_syscall_32+0x150/0xfb2 [ 1410.462670] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1410.462692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.462709] ? getname_flags+0x26e/0x590 [ 1410.462726] ? trace_hardirqs_off_caller+0x310/0x310 [ 1410.462749] __ia32_compat_sys_execve+0x94/0xc0 [ 1410.462770] do_fast_syscall_32+0x34d/0xfb2 [ 1410.462792] ? do_int80_syscall_32+0x890/0x890 [ 1410.462810] ? entry_SYSENTER_compat+0x68/0x7f [ 1410.462827] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1410.462844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1410.462861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1410.462878] ? trace_hardirqs_on_caller+0x310/0x310 [ 1410.462895] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1410.462912] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1410.462935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1410.462958] entry_SYSENTER_compat+0x70/0x7f [ 1410.462971] RIP: 0023:0xf7fbca29 [ 1410.462988] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1410.462996] RSP: 002b:00000000f5fb80cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1410.463017] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000000000 [ 1410.482448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1410.482458] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1410.482467] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1410.482476] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:30:30 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="4e62f4"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = gettid() ptrace$setsig(0x4203, r1, 0xffffffff, &(0x7f00000000c0)={0x19, 0x8, 0x1, 0x7fff}) mknod(&(0x7f0000000200)='./file0\x00', 0x1043, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000300aa0000"], 0x8) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000080)=0x50) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000240)="a27906858ece9e36efa81168d6afb2472ac0100bd487bd72cd0506c3c461771c5541bca36348845709") r3 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x18) 18:30:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x20000]}, 0x2c) 18:30:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:30:30 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x80, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000140), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20100, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x28, &(0x7f0000000180)}, 0x10) 18:30:30 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, 0x0) 18:30:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x14000000]}, 0x2c) 18:30:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x12) 18:30:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4b]}, 0x2c) [ 1412.067914] IPVS: ftp: loaded support on port[0] = 21 18:30:30 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ff80356a6b40e8b5fe33254ed532a6e23a2dd6e5f7f4c4942b6df75dabc1600fa57306b3c32d24be0d4a95fb65c630f4fb09ff064301f85d00e90d28d8f66e8ed2e5a6b61942713b4e5a0ce88cb3b67428bbbe1ac9af90fdb3854a0c1028e37d59965d9e5a3e2d8bc56fcd17d9deb7bc8f69c361a3388e5964b4eb72fe13a56fbd969d413f0ad9e84d4b53f0dd7284b10faf409420cbfa311b23080a4d1e8d2852400508823ff146d035e1b46a78ccc4abdf15c567befa44f2ed22afcdf56cd5a227158cac39080266d8b9859274f9bac810702cff4757ea654c1e259beb65373c8ddf8714f65dcd1f74c9457873936cdcd91b9346ed98b36204d9bee1b3464f2ba03c3ddade5b7ba22a0532fc86b8eafb632f6aa64e3d915d425497f22332a96429f4ac736deb"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x10000) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) 18:30:30 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/123, 0x7b}], 0x1, &(0x7f0000000180)=""/34, 0x22, 0x9}, 0x2000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, 0x0) 18:30:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x7]}, 0x2c) 18:30:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, 0x0) [ 1412.759422] IPVS: ftp: loaded support on port[0] = 21 18:30:31 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5950000000000, 0x40800) setsockopt$inet_int(r1, 0x0, 0xd, &(0x7f0000000100)=0x4, 0x4) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe803000000000000]}, 0x2c) 18:30:31 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) accept4(r0, 0x0, &(0x7f0000000080), 0x0) 18:30:31 executing program 3: clone(0x2000000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() io_setup(0xffff, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffffffffffff0000) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) write(0xffffffffffffffff, &(0x7f0000000180)='?', 0x1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') wait4(0x0, 0x0, 0xc0000000, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, 0x0) 18:30:31 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xd9f91ea5ef6dfc37, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2000fc, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="7ffa"], 0x2) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000240)={0x9, [0x6c36, 0x1, 0x7, 0x3f, 0x0, 0xfff, 0x10000, 0x9, 0xcb]}, &(0x7f0000000280)=0x16) mknod(&(0x7f0000000080)='./file0\x00', 0x402, 0x7) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000200)={0x0, r3}) sendto$unix(r1, &(0x7f00000002c0)="7aceb1c74ed5d00a79b8339e678102deb62e536f0a2dae1a7fc359d02b61dc5a87a48b9a469fa16c147ac23b8cf9020ec3ac266edc08088aaa66b9808ca127c0ffd295", 0x43, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x8737, 0x200) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:31 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f00000000c0)={{0x0, @name="d7c1e7da89aba03686d520b48b2a056f2391fd97adff3c4a3883b53c27e5fcd2"}, 0x8, 0x2941dbe1, 0x40}) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:31 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in=@dev}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) r2 = signalfd4(r0, &(0x7f0000000080)={0xa55b}, 0x8, 0x80800) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000240)=""/236, 0xec, 0x4f) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:31 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='projid_map\x00') clone(0x11102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 18:30:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa6020000]}, 0x2c) [ 1413.270872] IPVS: ftp: loaded support on port[0] = 21 18:30:31 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0xfffffffffffffe78, 0x3) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0x73) [ 1413.316226] ptrace attach of "/root/syz-executor3"[730] was attempted by "/root/syz-executor3"[731] 18:30:32 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x40405515, &(0x7f0000001000)) 18:30:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe0030000]}, 0x2c) 18:30:32 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f00000001c0)) openat$userio(0xffffffffffffff9c, 0x0, 0x10, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = memfd_create(&(0x7f00000000c0)=']em0U\'system^,vboxnet0\x00', 0x0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:32 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) membarrier(0x0, 0x0) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x94, r3, 0x209, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x4c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r1}, {0x8, 0x1, r0}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4040000}, 0x40) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc2c45513, &(0x7f00000004c0)={{0xa, 0x0, 0xffffffffffffff80, 0x1, '\x00', 0x10001}, 0x0, [0x9, 0x9, 0x2ea, 0x1, 0x80000001, 0x200, 0x21, 0x452ddee8, 0x2, 0x20, 0x5ed, 0x7fffffff, 0x3, 0x101, 0x5, 0x3ff, 0xd1, 0xfffffffffffffe01, 0x6, 0x2000000000000, 0xdd, 0x8, 0x1, 0x9, 0x80000000, 0x5, 0x9, 0x0, 0xdb, 0x5, 0x1, 0xcf, 0x3ff, 0x5, 0x2, 0x4, 0x7ff, 0x4, 0x200, 0x7, 0x9, 0x4, 0xaa6, 0x100000000, 0xc, 0x9, 0x1ff, 0x80000000, 0x800, 0x1, 0x206b, 0x1f, 0x9a, 0xda3, 0x7e9f, 0x2, 0x3, 0xe3, 0x5, 0x2, 0x2, 0x3, 0x4, 0x3, 0x0, 0x6, 0x1f, 0x101, 0x9, 0x7, 0x3ff, 0x4, 0x6, 0x40, 0xebb0, 0x6, 0x100000001, 0x9, 0x3, 0x0, 0x4, 0xc8, 0x1ff, 0x2, 0x51c1, 0x0, 0x0, 0x5, 0x7, 0x1ff, 0x0, 0x5, 0x0, 0x5e, 0xfffffffffffeffff, 0x0, 0x7, 0x8, 0x70ab, 0x4, 0x200, 0x5, 0x1, 0x100000001, 0x9188, 0x0, 0x3, 0x8, 0xbc80, 0x0, 0x7, 0x0, 0x8, 0x81, 0x865a, 0x101, 0x400, 0x8, 0x5, 0x4, 0x2, 0x3, 0xfffffffffffffff7, 0x2d, 0x4, 0x0, 0xfffffffffffeffff, 0x8912], {r4, r5+30000000}}) 18:30:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x803]}, 0x2c) 18:30:32 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000380)={[0x1000, 0x10002, 0xd000], 0x9, 0x40, 0x6f7b}) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x80000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x2) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x4, 0x8}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x0, @multicast1}}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) clone(0x2, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x9, 0x9, 0x8, 0xfff, 0x1, 0x2, 0x7f}, &(0x7f0000000100)=0x20) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}, [0x0, 0x4400]}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 18:30:32 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0xffffffffffffffff) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x80, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:30:32 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000100)={0x100, 0x0, 0x8, [{0x5, 0x9, 0x3, 0x100000001, 'em0'}, {0x6, 0xffffffffffffffff, 0x8, 0x5, "5c657468314024a2"}, {0x0, 0xcf73, 0xa, 0x9, '/dev/vhci\x00'}, {0x0, 0x0, 0xa, 0x9431, '/dev/vhci\x00'}, {0x5, 0x6, 0x2, 0x6, '#-'}, {0x5, 0x0, 0xa, 0x6, '/dev/vhci\x00'}, {0x3, 0x4}]}, 0x100) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x2c) [ 1414.175471] IPVS: ftp: loaded support on port[0] = 21 18:30:32 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x4) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:32 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="efa0"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc00]}, 0x2c) 18:30:33 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="02b1"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r3 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) getgroups(0x5, &(0x7f0000000500)=[0xee01, 0xee01, 0xee01, 0xee00, 0xee01]) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000540)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)={0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) r11 = getegid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000780)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, r1, 0x0, 0x3, &(0x7f0000000980)='}\'\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000a00)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000b00)=0xe8) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000002100)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)="729c45a7817efbfc888a28f5232c52f2550db80bdd595e62e099ef0117bdfdaf41e58d1b121cc2ac4048f0285f96cac307aaf2dd5d19e30f7282a0c322f2cf7d3cc5b3b320af6ef1f3a5a79354135a978cb6f297853db6b21d268d4fecc64568d3621645df3c82f7195d10b93c0e47921747f91c8fb8f3635d00ab40e0749d309bb2c7b6e3eda747ee6f965809467c9e07f319b6e335305c394428", 0x9b}, {&(0x7f00000001c0)="93d1c6052cea2c616a45c8a4675049812afb670c08590e0222ccf0aea6ef2b593824520bbfc363ee71d39164b7108518eeef82bd4504aba68841d6088b9e2ed46cb13654c799dad199c491be46b3291c138dd0a7cdbce742f0c3e126d14c081d78cf9e65b777a2db233a3264d04ce5a1e2389f87275b2fb6c1000cf6edb119af7c0589ebe1c01cea4f0df0df0876113ef82d5d861f39029a0d900d4426038fb5ead5eec1e990bb7feef6266c6d8b6df69d3bb9449ea16081f25150df0633c3ad85189292977d2ad7777778ac704e49798860151ec620f2e70856983c0b8a082fbe67d288835193", 0xe7}, {&(0x7f00000002c0)="b5b88efd7c0af6d449934ea7c528049aa4e68a03efd8e8760d16753a39f6174e", 0x20}], 0x3, &(0x7f0000002140)=ANY=[@ANYBLOB="180000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="180000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="300000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="100000000100000001000000", @ANYRES32=r1, @ANYBLOB="180000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="00000001", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="1800000001000000020000006fca79cb130eaf310451ef6a7a53c153d3c2ebd6babd27feb3b7cf5fb25f9a18b0766e97abbc784ab231a9f355d82515cc4d6ff1119b34f29456455876bb45b3a849b8b107142d568cd1c4cba774e7b94fda6bec66747712d395544e40faf741f8cd82c6", @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17], 0xb8, 0x8000}, {&(0x7f0000000cc0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002080)=[{&(0x7f0000000d40)="3575bae6123445e91328d6592852e83f1d5803b19192b973326cb7d990387f5905bce9c0f147fc76ffda8e361ff8184f9b4704d7a9eb673d7d9f1e910bbbadc9f8be2d0a1df9f0b133a9ebd50c5c71260f0c93a3009da710f93b000fbedfad60919b657c03b50c8974ba7c1cb2da26aa966ba774b8d2d6559b30158e5eb112e1386f3beeccf2fee1d686f34f8b0b316a80d197496e9375be033dc04bab3d6209d1b80ce7558e5fe2", 0xa8}, {&(0x7f0000000e00)="2ffe65994c14064551e6c9345e3297fe5a1ad6e15d8a71c92aeddadb1b29c5070bba5e2697293718debfc60374855064dc3c734a45a08cc58df4200ba9e187fb552160596d2ccb10e1e9a68c874176389ea7f0498569d6467f3d8c9c630207c47dd8d3f06621e2e608308bbca5ff31eff64b0f5a3fd859638d", 0x79}, {&(0x7f0000000e80)="2146bbef096d87259f0ebd4be63dfb3dd0c0922836fb47fdb3f482d107c782d4dd4b931559ca02d2fbf790e49a0a9f39b77148f2013c545f6c1807611715e0b7ccceb63d809bb4876a9e11ac39da4a18", 0x50}, {&(0x7f0000000f00)="f6878dba87fd18150b4c5e5748825b76589a0bcb708ce65e0c4c4bac60a2a0c166ee566b519896d388b3c58325a4b6b9ed9dd63ede4fc85f9068bbbab00d9ff87c65e4d56aa03c7839ff394be2a62dbb4a09e4ba37480cda0ee7bc1d790c47de7641a3604d3ae8bf7c9041f0fa9a6614135f4e8163dc7f3bd936740722d36b9ae286cc3242fbe231cc38330f399c5e416258be036ec461e2ab71de542c77894da53954620c47778a8f6e1477b486eaa26bc83300a2a3dd62becead8eb416330b20d075e48d85416439fbd58983706abcd9978d2f61f4f240fcb01e11f2490a4b4111d1baab0870b176f7ce4f894de047a11a53", 0xf3}, {&(0x7f0000001000)="c41bb8f2a9cf53ea388690ceb91a0d8d2787d19d80d6c1180edf2a1680a50923441dedb438c694c5227a086455b895694a13692a463b5e944b8b97724ac89160a42a7688506c931ee0b6c9ac7d849f6fea2edb941dc74324c81b142e400a80010be3ecf1d10fa17dd7424aa8baf79c6fb747c9dbdabaff50923b2d014c", 0x7d}, {&(0x7f0000001080)="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", 0x1000}], 0x6, &(0x7f00000020c0)=[@rights={0x18, 0x1, 0x1, [r0, r2, r2]}], 0x18, 0x40005}], 0x2, 0x4000800) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1403000000000000]}, 0x2c) 18:30:33 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x5252) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000100)=0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x10, &(0x7f0000000340)={&(0x7f0000000240)=""/229, 0xe5, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f00000003c0)={&(0x7f0000000140)=""/238, 0xee, r2}}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x80004040045010, &(0x7f0000000040)=0x7) write(r1, &(0x7f0000000440)="bdf7d876c6df1eefd25c0e6c68172e95a06a5731f7d835d21300a2b97cecde5f1e93cb88be0870494722b04094f5fb3466621bb747d19c68458b342371b6bb98caee8576fc66a7f084222c91d218", 0x4e) 18:30:33 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="ff80990b111d37d455ba9d0e91a54a1c45b15c752829d6562f5c22d8cc6eb32e20a41321b09cf405e9a251578d116e9f6e1939565567742eb2c95ff530b577d72516fe4990d8bbe387395aa84d87cb0000000000000000000000"], 0x2) fcntl$setlease(r0, 0x400, 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa403000000000000]}, 0x2c) 18:30:33 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$unix(0x1, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x303402) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x10002, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:33 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000380)={[0x1000, 0x10002, 0xd000], 0x9, 0x40, 0x6f7b}) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x80000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x2) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x4, 0x8}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000280)={'gretap0\x00', {0x2, 0x0, @multicast1}}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) clone(0x2, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x9, 0x9, 0x8, 0xfff, 0x1, 0x2, 0x7f}, &(0x7f0000000100)=0x20) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}, [0x0, 0x4400]}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 18:30:33 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) ioprio_set$uid(0x3, r0, 0x6) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:34 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) fcntl$setflags(r0, 0x2, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe003000000000000]}, 0x2c) [ 1415.336017] IPVS: ftp: loaded support on port[0] = 21 18:30:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1202000000000000]}, 0x2c) 18:30:34 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff6d40607c81a47db462f8862f9c49d837e609bc43434b878ab8f3d20f81c29c31c1e29f8fdf8f905b31b4e00af761b680015092d6a92955f449424e0d3fc0cb0a42a095f923a2c2f4e4433fa6c55f6864c4442d97"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd000000]}, 0x2c) 18:30:34 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0xffff, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x20) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) fcntl$setstatus(r2, 0x4, 0x42400) 18:30:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x101000, 0x44) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x6) 18:30:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3df]}, 0x2c) 18:30:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) 18:30:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa0020000]}, 0x2c) 18:30:35 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40) fdatasync(r0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80024040045010, &(0x7f0000000100)=0x7) fcntl$getown(r0, 0x9) 18:30:35 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000100)=""/237, 0xed}, &(0x7f0000000200), 0x10}, 0x20) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:35 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x800) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000100)=0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000400)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x208204) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) preadv(r0, &(0x7f00000075c0)=[{&(0x7f0000006200)=""/220, 0xdc}, {&(0x7f0000000000)=""/90, 0x5a}], 0x2, 0x0) 18:30:35 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xba02]}, 0x2c) 18:30:35 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x10000, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:35 executing program 1: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x1, 0x123c02) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000200)={0x0, @aes256}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000080)=0x1f) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x6, 0x30, 0x9, 0x10000}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r3, 0x1d71, 0x30, 0x9}, &(0x7f0000000180)=0x18) 18:30:35 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="ff80ac93269c2cd9df7858d328fd4d4993e0b9d7050f509185276e652e497174aca7662da8d2e392e7b637743628d956fb82a4a2a0e76d9137c2a6b9a57deaf93d0da7df5edec64a04be224597319b7b377767910e0a1ce04f307dc5642941595bf6fffb892c5e9207cdee3e85f9ecb85ccdcb18d5d718fb105beadf6d6d0c959fd0c026f565359c7bfa0b2601211ebd86ad666bed6a7ffee8ca9d62c46d1373167912f811ef846cd64f2944c6ebe4d7cd476a07b2eba9dfcd2a03bb4f5c00a8a7592359551adcc7813819039539713e4c00518c006325b19990720699b6"], 0x2) close(r0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000200)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) getrandom(&(0x7f0000000040)=""/46, 0x2e, 0x3) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) flistxattr(r2, &(0x7f0000000100)=""/237, 0xed) [ 1417.146200] IPVS: ftp: loaded support on port[0] = 21 18:30:35 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xca02000000000000]}, 0x2c) 18:30:35 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x5, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0x6}, &(0x7f0000000180)=0x8) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)) 18:30:35 executing program 2: sched_setscheduler(0x0, 0x3, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="ff7c9fa59ce87dcdb36c950ee759cc4aee8fee835297b302bb479b2ab46fb0b6552c111504fe9cc3c351b28ab7608d2042ae3e85ecb2e6e86326a4b30f81c52d3e0008000000000000847b2ea84a18ea893cae2e1764908e61a2f933b44ce92cf8daad4ee18a7d22431d962d5cf13935093b663a379b7e99c4eee6c50d09a832c037a60fca24bb191f"], 0x2) close(r0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000140)={0x0, 0x9, 0x5, 0x8}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x1, 0x0, @ioapic={0x2000, 0x7fffffff, 0xffffffffffff0001, 0x2, 0x0, [{0x7, 0xffff, 0x2, [], 0x20}, {0x8d, 0x4, 0x0, [], 0x6}, {0x5, 0xfffffffffffffff7, 0xa82c, [], 0x63}, {0x6, 0x6, 0x4ed, [], 0x40}, {0xe1f8, 0x2, 0x80000000, [], 0x3}, {0x6, 0x1, 0x2, [], 0x4}, {0x0, 0x1, 0x500000000000000, [], 0x2}, {0x5, 0x9, 0x200, [], 0x7b6}, {0x1, 0xeba, 0x5, [], 0x7fff}, {0x0, 0x8, 0x80000000, [], 0x7}, {0x4, 0x3, 0x4, [], 0x8}, {0x4e6a, 0x3, 0x7, [], 0x3}, {0x0, 0x800, 0x94, [], 0x2e3}, {0x7fffffff, 0x2, 0xffffffffffffffff, [], 0x1}, {0x0, 0x7, 0x100000000, [], 0x4}, {0xffffffffffffffff, 0x1, 0x401, [], 0x800}, {0x0, 0x0, 0x3, [], 0x9}, {0x80000001, 0x5, 0x7}, {0x6, 0x7, 0x3f, [], 0x1}, {0x3, 0x5, 0x9, [], 0x2}, {0x7fff, 0x7, 0x1, [], 0x6}, {0x3, 0x2279, 0x2, [], 0x401}, {0x800, 0x100, 0x6, [], 0x6bdb}, {0x3, 0xffffffffffffff80, 0xffff, [], 0x2}]}}) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="230068adf1dcebda3ab70bb9da5f000000004c75a9aec2496f545556967d9535b2aad3dbb07e63fb67aa5af9a6f5dc3983c86c578100ce71a4d42d1144a642f7b599e4245f5d7d5c7b5cbbc6891eb47df3c6b0f565286adf31db1506fe1d8a764ccaa9f32210ad73ceb6b59a8408c04be1785108dbe6bb61dd2456fbc1c5bfe03952117af1b23b208fc7ad1707fc7e60d5e9cfd001864d8b8df7b27633f363d45cfb62d1e314f705117983111d2d7d29c02ff4646a76111647e7999e51d46f59027f013e2a74065fa1f7a417c456"], &(0x7f0000000080)=0xa) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r1, 0x4) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0x95, "cdedafee662b980806ccfda4f5708409c55bd0482bbdfae7be4b796b6e63ad2407a0f47ab57cefd9ffd0e80559c97ba95173b804b3eafc1ae96178d0ddd193068d8a162455e811c7ceab9b2cc682d73137c4a6358bb2df320df7b35d27542388fdcdd8ef5e2cabf87d6e698818e9ca4dc24d0973eb6f851187a1116e737be8b7d3bcf43a8666e8c62a73b642518326d93add95e15e"}, &(0x7f0000000040)=0x9d) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={r3, @in6={{0xa, 0x4e22, 0x2, @ipv4={[], [], @broadcast}, 0xfffffffffffff48f}}}, &(0x7f0000000580)=0x84) socket$nl_generic(0x10, 0x3, 0x10) fchdir(r2) bind$netlink(0xffffffffffffffff, 0x0, 0x170) 18:30:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x26000000]}, 0x2c) 18:30:36 executing program 3: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) r0 = socket$inet6(0x18, 0x3, 0x3a) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) r1 = dup(r0) sendto$unix(r1, &(0x7f00000000c0)="5e9b48d20089847570b8", 0xa, 0x0, 0x0, 0x0) 18:30:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x35, 0x40, 0x8}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0xffffffff, 0x2, 0x1, 0x1, r1}, &(0x7f00000001c0)=0x10) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:36 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) fcntl$notify(r0, 0x402, 0xa) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:30:36 executing program 3: 18:30:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf]}, 0x2c) 18:30:36 executing program 0: unshare(0x6c060000) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCSTI(r0, 0x5412, 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x200, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@local, @rand_addr, 0x1, 0x2, [@multicast2, @broadcast]}, 0x18) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:36 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x121100) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/167) r1 = dup2(r0, r0) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0xae) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:36 executing program 3: 18:30:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x5]}, 0x2c) 18:30:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000000c0)) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x111000, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x2) 18:30:36 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) write$UHID_CREATE2(r0, &(0x7f0000000100)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0xa6, 0x5, 0x4, 0x0, 0x2, 0xf1f, "6a9dc3e72107e1dc511e582183565d2debb5f5baa811b70fcfa61021f06384f847c86a05a67e9dc36c7d9155ad7aa86469cdea63781a218fb32afd10547d6d51fae2e1467f69afda51e344756a038415207f2b587609d0f11f625a2c640174da719e956fcaed6c6aea2fd2d5af500eda2a1e8aac287f7db428f7e545106fa2ce9da4d37c45e4a40fa0c6274fd7ce84e7e3c7ec8419401e0dea592767aea9f9efbebffa888833"}, 0x1be) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="b9f0"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) [ 1418.146983] IPVS: ftp: loaded support on port[0] = 21 18:30:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x32000000]}, 0x2c) 18:30:36 executing program 3: 18:30:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x300]}, 0x2c) 18:30:37 executing program 3: 18:30:37 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x800000000010000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9, 0x80002) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="26630a6b4978c61fe4a90004020ef6b46624b591cac3b4a3a003ebdb9f9c1bf23497a914e6fa3d3db0e6264e23bda42e2d972970a498f46a078588406fee994792845f085be2cd"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) link(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file0\x00') mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)={0x0, 0xff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r3, 0x438, 0x5, 0x0, 0xcb86, 0x3}, &(0x7f0000000240)=0x14) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000280)={[{0x6, 0x0, 0x5, 0x80000000, 0x6, 0x3f, 0x401, 0x2, 0x1ff, 0xe6, 0x100000000, 0x73cf8a45, 0x6}, {0x9, 0x5d62, 0x80000001, 0xfffffffffffffffa, 0xffffffffffffffff, 0x8, 0xcbbf, 0xffffffff00000001, 0x4, 0x80, 0x400, 0x2, 0x80000000000}, {0x7, 0x80, 0x0, 0x6, 0x793, 0xfffffffffffffffd, 0x8000, 0x3, 0x4, 0x1000, 0x0, 0x8, 0x32}], 0x6}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000380)=""/189) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r4, &(0x7f0000000300)=0x35, 0xa2) 18:30:37 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x7fffffff) fsync(r0) 18:30:37 executing program 0: unshare(0x6c060000) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x44f, 0xfaf, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @ipv4}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x400000, 0x7ff]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r7 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x100000000) pwritev(r7, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r6, r7, &(0x7f0000000240), 0x20000102000007) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) 18:30:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4]}, 0x2c) 18:30:37 executing program 3: 18:30:37 executing program 1: r0 = dup(0xffffffffffffffff) write$P9_RSTAT(r0, &(0x7f0000000180)={0x59, 0x7d, 0x2, {0x0, 0x52, 0x200, 0xfffffffffffffff7, {0x42, 0x0, 0x6}, 0x20c0000, 0x1, 0x3f, 0x6, 0x9, 'mime_type', 0xa, '/dev/dsp#\x00', 0x6, 'system', 0x6, '#nodev'}}, 0xfe99) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x80100) socket$inet6_udplite(0xa, 0x2, 0x88) flistxattr(r1, &(0x7f0000000080)=""/212, 0xd4) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:37 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet(r2, &(0x7f0000000080), &(0x7f0000000100)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) dup3(r1, r0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:37 executing program 4: 18:30:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000600)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x20001}}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 18:30:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf802000000000000]}, 0x2c) [ 1419.149067] IPVS: ftp: loaded support on port[0] = 21 18:30:37 executing program 3: 18:30:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe8030000]}, 0x2c) 18:30:37 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x3, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}, {0x77359400}}, 0x100) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000140)={0x5, 0x4, [0x9]}) 18:30:38 executing program 4: 18:30:38 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1, 0x2000) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000100)=""/28) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:38 executing program 3: 18:30:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xde03]}, 0x2c) 18:30:38 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ffc053f2de9f788db3552d9aed7dfb5819c061b1fb0f89555fada7527295c8a12f223304c245f4fbb438e68e2a79bd0f2adff4fa559fa5bfb17ec36abf88d36380a95d81978942f8ec2c518c4bdb89dce9fbb0d6d9e9097915b9dc49a22df0631cb58753d6b470e77a9a8778bf8e00000000000000000000000000000000"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x3f) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400000, 0x0) bind$netlink(r0, 0x0, 0xffffffffffffffa7) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:30:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:38 executing program 4: 18:30:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3fc]}, 0x2c) 18:30:38 executing program 3: [ 1419.808380] IPVS: ftp: loaded support on port[0] = 21 18:30:38 executing program 4: 18:30:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x6, 0x20000) open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x41) 18:30:38 executing program 4: 18:30:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1402000000000000]}, 0x2c) 18:30:39 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x0, r0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0x8}}, 0x18) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:39 executing program 3: 18:30:39 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x100000000005007f) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:39 executing program 4: 18:30:39 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f0000000100)={{0x2c78, 0xb32c}, 'port1\x00', 0x1, 0x100014, 0x9, 0x2, 0x180000000000, 0x1f, 0x6, 0x0, 0x7, 0x100000001}) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000040)=""/28) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2500000000000000]}, 0x2c) 18:30:39 executing program 4: 18:30:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x5a010000]}, 0x2c) 18:30:39 executing program 3: 18:30:39 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000080)={0x0, 0x10000}) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) [ 1420.737540] IPVS: ftp: loaded support on port[0] = 21 18:30:39 executing program 4: 18:30:39 executing program 3: 18:30:40 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2001, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x420000, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000140)=r1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:40 executing program 3: 18:30:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9a02]}, 0x2c) 18:30:40 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "4887686257f09ccf98f6af468bb1871976a38616"}, 0x15, 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:40 executing program 4: 18:30:40 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) 18:30:40 executing program 4: 18:30:40 executing program 3: 18:30:40 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfa010000]}, 0x2c) 18:30:40 executing program 3: [ 1421.718064] IPVS: ftp: loaded support on port[0] = 21 18:30:40 executing program 4: 18:30:41 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) 18:30:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3f000000]}, 0x2c) 18:30:41 executing program 3: 18:30:41 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) close(r0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x7, 0x4ca, 0x280000000000}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:41 executing program 4: 18:30:41 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x101000, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000180)=""/56) 18:30:41 executing program 4: 18:30:41 executing program 3: 18:30:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xda03]}, 0x2c) 18:30:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb]}, 0x2c) 18:30:41 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7ff, 0x8000) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:41 executing program 3: 18:30:41 executing program 4: 18:30:41 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) ptrace$getregset(0x4204, 0x0, 0x201, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 18:30:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 18:30:41 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x0, 0x4}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchmodat(r1, &(0x7f0000000080)='./file1\x00', 0x14c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x1, 0x0, [{0x400, 0x1, 0x0, 0x0, @irqchip={0x81, 0x2}}]}) 18:30:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2ca]}, 0x2c) 18:30:42 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) restart_syscall() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) r2 = getpgrp(0xffffffffffffffff) r3 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e24, 0x40, @loopback, 0x9}}, 0x8, 0x7fffffff, 0x6, "ffe3ed819c081613ad41ee0dbbbec1fc750165afe67c18f75c548a52061a53801e7aeaacf69f3b7115377e43d7e75bd76ef7f00cf694984e0a2da12c91c10b89de03cbdca7f1c1043f6cf6e61ffc0002"}, 0xd8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r4, r0}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x6, 0x1) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000100)=0x3f, 0x4) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 18:30:42 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 18:30:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2c02000000000000]}, 0x2c) 18:30:42 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:42 executing program 1: listen(0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x80004040045010, &(0x7f0000000040)=0x7) r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000080)="e11dee0a1bdfb3c297a95079739304b8abe411eb3922480293a4e23f626b5064991292e1c0ee3ce7fad23ed7997069f72635d5532eb6a97c47c245da6164f0c146dedeab8efe0cd033e9ccaa74fa89d23bf616dc3174924d6cf6c3d75185c5e2b751f3ca8346a0e63197cf28f8f3fdd37a", 0x71, 0x20040044, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) [ 1423.569221] IPVS: ftp: loaded support on port[0] = 21 18:30:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 18:30:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb603000000000000]}, 0x2c) 18:30:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0x3}}) 18:30:42 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2600000000000000]}, 0x2c) 18:30:42 executing program 0: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x40000000003, 0x80010, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="973998db3a5d85a05427775105e703cdb899d8444da554506f9e0ced045e68a9b8cf2cf0c26e9e12183f63bc55d69b0287b5c3509532a8d46ee0517cbde2ce2426578deab5774e2f456d933785eb5318d943ed8def6273", 0x57) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={r2, r3, r4}, 0xc) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:42 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r0, 0xa, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000080)) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:42 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x10000}, 0x1) ioctl$int_in(r0, 0x0, &(0x7f0000000140)=0x9) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x5, [0x400, 0x3, 0x80000001, 0x3, 0xcc]}, &(0x7f0000000100)=0xe) 18:30:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 18:30:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0x3}}) 18:30:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa602]}, 0x2c) 18:30:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3b6]}, 0x2c) 18:30:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0x3}}) 18:30:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:30:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x7000000]}, 0x2c) 18:30:43 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000100)={0x6, 0x9}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:43 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x8, &(0x7f0000000080)={0x3}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) socket$nl_generic(0x10, 0x3, 0x10) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:43 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x20c000) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc203]}, 0x2c) 18:30:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0x3}}) [ 1424.726757] IPVS: ftp: loaded support on port[0] = 21 18:30:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x29a]}, 0x2c) 18:30:43 executing program 4: socket$inet6(0xa, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x809}) 18:30:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x40200, 0x0) statx(r0, &(0x7f0000000240)='./file0\x00', 0x7100, 0xfff, &(0x7f0000000280)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x569}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r2, 0x100000000, 0x0, 0x6, 0x401}, &(0x7f0000000140)=0x18) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x4, 0x6, 0x4, 0x1, 0xfffffffffffffff8, 0x981, 0x4, 0x2, r3}, &(0x7f00000001c0)=0x20) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000380)=0x200) 18:30:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1500]}, 0x2c) 18:30:43 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff69777c655b4300c8c2cefc90"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:44 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4188c0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=""/107, &(0x7f0000000180)=0x6b) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:44 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') getpeername$packet(r0, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000640)={@loopback, 0x72, r3}) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c00f000", @ANYRES16=r2, @ANYBLOB="090025bd7000fbdbdf250f000000280003000800010073ed33d314000600fe8000000000000000000000000000140800080003000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) socket$inet(0x2, 0xb, 0x9) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) dup(r0) write$P9_RWRITE(r1, &(0x7f0000000440)={0xb, 0x77, 0x2, 0x80000000}, 0xb) ioctl$int_out(r0, 0x5462, &(0x7f0000000280)) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f00000004c0)=0x2) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$VIDIOC_S_FMT(r1, 0xc0cc5605, &(0x7f0000000340)={0xd, @pix={0x0, 0x80000000, 0x5773765f, 0x3, 0x5, 0x544a01dd, 0x9, 0x6, 0x1, 0x0, 0x1, 0x3}}) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000140)={r0, 0x0, 0x3, "eb23e08a6ea9b4c1940ea2574e65955405ad8b3ec36ed0179ada11159b12bdd2ca945f4fa5f1e6448403cb65543a3ccc0ee4578b8abac1e6f2366a1748bb72352f9c501f1983627711073f24147d4a0684af4dda0a30e6fafd96dd847e26d97c88a5c1e15b1e1184a62e6235a21144cdaaae9f8a843649d0ba2cf7c5daf4f328fc8f4024e9b28e0ea5ebd7cfa43fbbe2272f32"}) 18:30:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x71000000]}, 0x2c) 18:30:44 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r0, 0xa, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000080)) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:44 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0xb0, 0x3f, 0x8cc, 0x7, 0x7, 0x3, 0x7, 0x5, 0x399, 0x40, 0xa6, 0x5, 0xffff, 0x38, 0x1, 0x7ff, 0xbb74, 0x8466}, [{0x6474e553, 0x4, 0x8, 0x9, 0x8000, 0x7fff, 0x8, 0x4}], "41c9f20cae8e86b703e86e9974e09bf6636091302d2aa570758106c45cc1d5df25156375f42748e783", [[]]}, 0x1a1) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="ff80562489e9bdbcbcc15cc6df0e583dfafdce0bab0e73eaffb9fc7b3ab76f02378bfec2bcd36e119a32172f6c405be9f64ccf334cb4d3ab2faaaaa1d2fc5cd8bb17a24e7fb0df614a0c197d866af5c6630bf9df95ae5c8bb39afad19e601f68b17dfb9a291d773c6045cd0acef6a8ebb42920b4d99d953199a428933774e6"], 0x2) close(r1) fanotify_mark(r1, 0x12, 0x40000000, r1, &(0x7f00000000c0)='./file0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9002]}, 0x2c) [ 1425.911079] IPVS: ftp: loaded support on port[0] = 21 18:30:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:44 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1fffffffffc, 0x2) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x308]}, 0x2c) 18:30:44 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="400020f915e693573d84ce21db2bce31"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x4, 0xa000}) 18:30:45 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:45 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) sendmsg$alg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="aa69b91881e2c6a488b2668da5be15df1fb0fd40319a6bf847db7d0c2fa9f631a37c5ab4974dcf54b47b3a6339a5a04c0f382fde68da866e6e30c64b8dfd857fb10a0372852abaf6aa59e8354b8643b175470f69132f1437db634bdf848379adc47c7bb4899f045b28a21c05f82fc71ce1809af9179010b84c6f54e043448d1d4ac02dadde3aef760d282eda668b284551a1749eeefc73ae75493c86ebb177384688a650158b8a6a67175b452b055f3a0a5a417d26dff176f1a52463afa90407bb18219575074696e8a513e60ca6bc0c26832a04f198f4d9c125cfe62d05343ce6bca8a71e0e64df320c2e6e4aaa259f30", 0xf1}, {&(0x7f00000001c0)="4aab663f4f15faebdd2e40476b6e898fe8f158af32cc2f54346aa59c4e23233b9fce4b3c424af337249bd5bb3e31eac0e40599479e7690ef23c2e01b8074e586abbf60997a31671d1370a7a582c989ff95b495fc654fddb42d464c7c0366b0d03afb9810b77a92609b04d7946f9df4e284aa41084f5020604cedafdf2413c8c916e56d81e3d1a43bec4ce0f480965e79b08a636098a4b374d3d7d2b7964e9ca2a640d7a607", 0xa5}, {&(0x7f0000000280)="c91153e416f746d39c8afdc6e3b9ba022ccee1946555205f10ecb0612118d5", 0x1f}, {&(0x7f00000002c0)="02884978b711a7ecf5f5b3892df6bb9d5774144f74f80eda0c2fa0af8e5508cd4910a5ba41407ea1786091c9eaa7e1dea5fb00dbb323ade247", 0x39}, {&(0x7f0000000300)="26ee00da05df57296e03c50670149ed8cfb0c6e85a1744173103c7d9ee26f375991a2e1961f638a91aa916ad68622c8d61f34a9f34f863bbe2755f3f33e54e64caa1bf7436a1ab31dcb9d4e40f4b389f6d1a0695dc1d49142792c861dfddd48cf12c0c0438f6e6bd7e31b3019f21c31e08381eb1e4f7446cdd267df0a288e4cc5c4f09431e535b7fc86016e63a21fc1d34dde18c99ef2db075c75336f8d1905ff04071585784c299c122cd61368200ef2a5aa50dc2c82b26605a03b1c1d82a2e983f86a67ba611e10aa9ff1448d8043e1dcd7d0755", 0xd5}, {&(0x7f0000000400)="71cfa1b7a44264076a713b48bba13542fd5233fd501958ce8af4e030129ab11959303df24feda9cd4fd6585916ec83a72cc8ae374cae305f1b51f46014103a98a694e2b77d61b9c33b7f59cbef153065aca60a0e70d7cc075ba6c1eb26877a62ae0c420a872988fc748ef97fdb1ab50b630083c41e66f17cd2144be413662019d626643b235e61338a4a4946dd478cd3a40f83201112a904e02696b1a087190af91effff3de26cb7552dd4f46c23292f2cc12b163840ff74bb7f12e95f9fc74005731f7680b453643b484d88321bb8b6b00b7be9335d206e131d87bed55aea726afb1d", 0xe3}], 0x6, &(0x7f0000000540)=[@op={0x10}, @iv={0xb4, 0x117, 0x2, 0xa1, "31662008e50444b910294b8ee52d3685a0b9d9aa218e6c962ba9a8790a195dfcd57b665d215904173de7187c3d490d0051f0d1e5a4920aa4570e66ed540534142992f8edf5ba3ab833a764d07ba539ee7c41a4073cb55f986ec705ad5c8af6e85e88f2aa4e81d8ad31eae7baf61cb03f0465a45eba80173e10865a5c64730afbcb42bca32daeba6b18f373a4556c9f7bdcf6682e10e3cade233c176bd3ef51c46b"}], 0xc4}, 0x80) 18:30:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x2c) 18:30:45 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r0, 0xa, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000080)) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:45 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x46, "f20148502f31d0ff02e8bf52c965481ffff973c30c33585c3c920408cfebeab7a12c1fd32dd1fca0ac79f4a47f1a0a0ca6f8f145c2cfb656a6782f1a6a4ee0e764d8dc5836ab"}, &(0x7f0000000100)=0x4e) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r2, 0xfffffffffffffffe, 0x0, 0x0, 0xe0000000000}, &(0x7f0000000180)=0x18) 18:30:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1200000000000000]}, 0x2c) [ 1426.868997] IPVS: ftp: loaded support on port[0] = 21 18:30:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:45 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0080e1c6f906f8aa66186cd26dc372524be9937570f6a473247cd15960a403000000ee3cbbc64bdb5041a08a1038a11597849bcd57f42efcdfcca68fad197d91a181db43834d6542e552ce117462d20d69494e3c24882f19afc12e2543f16f2d2207e221db2e591e6c62db879e00ee53062860bb9988843a08fd71f8fb72cfd1f8fbabce896540"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x51b}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1, 0xffffffff}, &(0x7f0000000100)=0x8) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:45 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) fcntl$setlease(r0, 0x400, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$void(r0, 0xc0045878) 18:30:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc2030000]}, 0x2c) 18:30:45 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00'], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000040)={@loopback, @broadcast, 0x0}, &(0x7f0000000080)=0xc) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in6=@local, 0x4e22, 0xfffffffffffffff9, 0x4e20, 0x4, 0xa, 0xa0, 0x20, 0xbb, r3, r4}, {0x10001, 0x3, 0x28000000000000, 0x0, 0x81, 0x4, 0xbe54, 0x480000000000000}, {0x1, 0x2, 0x2, 0x81}, 0x8, 0x6e6bb4, 0x2, 0x1, 0x3, 0x3}, {{@in6=@local, 0x4d3, 0x2b}, 0x2, @in6=@mcast1, 0x3507, 0x3, 0x0, 0x0, 0x0, 0x8, 0x400}}, 0xe8) 18:30:46 executing program 0: unshare(0xffffffd) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x8000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:46 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x5, 0x2000) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000380)=0x4) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000000c0)='/dev/dsp#\x00', &(0x7f0000000100)='mime_type:-/#-mime_type$-\\\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\'vmnet1\x00', &(0x7f0000000200)='securityvmnet1ppp1procmime_typeppp1\x00', &(0x7f0000000240)='/dev/dsp#\x00', &(0x7f0000000280)='.\\bdeveth0cpusetsystem\'wlan1\x00'], &(0x7f0000000340)=[&(0x7f0000000300)='/dev/dsp#\x00'], 0x500) 18:30:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf400]}, 0x2c) 18:30:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:46 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x7fff, 0x80) inotify_add_watch(r0, &(0x7f0000000580)='./file0\x00', 0x80) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x4, 0x100) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x280, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, 0x0, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f0000000380)={0x7, 0x8, 0x9, 'queue1\x00', 0x1}) getresuid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f00000004c0)={{0x100, 0xfffffffffffffffd}, {0xff, 0x80}, 0x5, 0x2, 0x1}) fsetxattr$system_posix_acl(r3, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x1}, [{0x2, 0x1, r4}, {0x2, 0x4, r5}, {0x2, 0x1, r6}], {0x4, 0x5}, [{0x8, 0x4, r7}], {0x10, 0x2}, {0x20, 0x2}}, 0x44, 0x1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x245) 18:30:46 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r0, 0xa, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000080)) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:46 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:46 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe003]}, 0x2c) 18:30:46 executing program 1: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f00000000c0)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:46 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff00a43d191a3d4c8675992fabd24b9183d3c73d9acadfdf2bf66783cadb86df037ae1a6b49eead0a0c3b6eacdc95ac9d67b106ba222851026863ff5a0bfa37a4fde1622ee77184faacc"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r2, 0x8}, 0x8) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:46 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x32]}, 0x2c) 18:30:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x0, 0x4}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchmodat(r1, &(0x7f0000000080)='./file1\x00', 0x14c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x1, 0x0, [{0x400, 0x1, 0x0, 0x0, @irqchip={0x81, 0x2}}]}) 18:30:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000080)={0x0, 0x2710}, 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80004040045011, &(0x7f0000000100)=0x9) 18:30:47 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x2402, 0x2) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x2, 0x3, 0x100, 0x0, 0x0, 0xce88, 0x44400, 0x8, 0x1, 0x7, 0x400, 0x80, 0x9, 0x7fff00000000000, 0x0, 0x8, 0x101, 0x82, 0x10001, 0x8, 0xc470, 0x100000001, 0x8000, 0x80, 0x4, 0x8, 0xffffffffffffffe0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff, 0x65, 0x4, 0x2b0, 0x4, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x6, 0x1}, 0x5000, 0x101, 0xffffffffffffffff, 0x8, 0x3, 0xffffffff}, r0, 0x8, r0, 0x4) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x800, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000140)=0x20, 0x4) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000080)=ANY=[@ANYRES32=r0], 0x4) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2c020000]}, 0x2c) [ 1428.549355] IPVS: ftp: loaded support on port[0] = 21 18:30:47 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x80000) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0xa8, 0x8, 0x3}) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000004c0)=""/169) timerfd_gettime(r0, &(0x7f0000000240)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) ioctl$int_in(r1, 0x80004040045010, &(0x7f00000000c0)=0x7) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000140)={0x1f, 0x8c}) 18:30:47 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/239) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/7, 0x7) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000140)={0x7, 0x3, @raw_data=[0xffffffffffff34b7, 0x5, 0xfffffffffffffffe, 0x6, 0x6, 0x6, 0xfffffffffffffc41, 0xfffffffffffeffff, 0x5d1, 0x1, 0x100000000, 0x3, 0x0, 0x8, 0x8000, 0x200]}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb6030000]}, 0x2c) 18:30:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:47 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x0, 0x4}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchmodat(r1, &(0x7f0000000080)='./file1\x00', 0x14c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x1, 0x0, [{0x400, 0x1, 0x0, 0x0, @irqchip={0x81, 0x2}}]}) 18:30:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xbc00]}, 0x2c) 18:30:47 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x10000000080, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x109000) 18:30:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd000]}, 0x2c) 18:30:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:48 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/139, 0x8b}], 0x1, 0x0) 18:30:48 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x0, 0x4}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fchmodat(r1, &(0x7f0000000080)='./file1\x00', 0x14c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x1, 0x0, [{0x400, 0x1, 0x0, 0x0, @irqchip={0x81, 0x2}}]}) 18:30:48 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000100)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e21, @multicast1}, {0x307, @broadcast}, 0x4, {0x2, 0x4e20, @local}, 'bond_slave_1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 1429.779187] IPVS: ftp: loaded support on port[0] = 21 [ 1430.988421] device bridge_slave_1 left promiscuous mode [ 1430.993950] bridge0: port 2(bridge_slave_1) entered disabled state [ 1431.001894] device bridge_slave_0 left promiscuous mode [ 1431.007533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1431.040356] team0 (unregistering): Port device team_slave_1 removed [ 1431.052579] team0 (unregistering): Port device team_slave_0 removed [ 1431.066377] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1431.077904] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1431.106454] bond0 (unregistering): Released all slaves 18:30:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x10]}, 0x2c) 18:30:56 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8003, 0xfffffffffffffff9) ioctl$void(r0, 0x5451) sendfile(r0, r0, 0x0, 0x2) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:30:56 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) close(r0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x7, 0x4ca, 0x280000000000}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:56 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:30:56 executing program 0: unshare(0x6c060000) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0xfffffffffffffffc) openat$userio(0xffffffffffffff9c, 0x0, 0x280c1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:30:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa4030000]}, 0x2c) [ 1437.501949] IPVS: ftp: loaded support on port[0] = 21 18:30:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:56 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 18:30:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8030000]}, 0x2c) 18:30:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:30:56 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) close(r0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x7, 0x4ca, 0x280000000000}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1437.870611] IPVS: ftp: loaded support on port[0] = 21 18:30:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4a02]}, 0x2c) 18:30:56 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$setperm(0x5, r1, 0x200000) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, 0x3, {0x0, 0x5}}, 0x20) splice(r0, &(0x7f0000000100)=0xc1, r0, &(0x7f0000000140), 0x100000001, 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r2, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a45320, &(0x7f0000000180)={{0x7ff, 0x7}, 'port1\x00', 0x20, 0x6, 0x3, 0x81, 0x9b, 0x9, 0x7a}) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) [ 1438.849222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1438.855652] bridge0: port 1(bridge_slave_0) entered disabled state [ 1438.863027] device bridge_slave_0 entered promiscuous mode [ 1438.894905] bridge0: port 2(bridge_slave_1) entered blocking state [ 1438.901566] bridge0: port 2(bridge_slave_1) entered disabled state [ 1438.908773] device bridge_slave_1 entered promiscuous mode [ 1438.939897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1438.971622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1439.101436] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1439.156352] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1439.391259] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1439.399170] team0: Port device team_slave_0 added [ 1439.448839] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1439.456333] team0: Port device team_slave_1 added [ 1439.504163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1439.558003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1439.608798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1439.660151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1440.179701] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.186101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.192869] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.199302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.208433] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1440.717465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1441.338608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1441.441949] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1441.540345] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1441.546483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1441.554134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1441.647954] 8021q: adding VLAN 0 to HW filter on device team0 18:31:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x7100]}, 0x2c) 18:31:01 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) close(r0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x7, 0x4ca, 0x280000000000}) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:01 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) 18:31:01 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) readv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/4, 0x4}, {&(0x7f0000000100)=""/131, 0x83}, {&(0x7f00000001c0)=""/90, 0x5a}, {&(0x7f0000000240)=""/230, 0xe6}, {&(0x7f0000000380)=""/13, 0xd}, {&(0x7f00000004c0)=""/201, 0xc9}, {&(0x7f00000003c0)=""/184, 0xb8}], 0x7) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000600)={{0x5, 0xc1, 0x9, 0xc5, 0x4, 0x1000}, 0x1ff}) 18:31:01 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x240, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4b000000]}, 0x2c) [ 1442.738160] IPVS: ftp: loaded support on port[0] = 21 18:31:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:01 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x2c) 18:31:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa603000000000000]}, 0x2c) 18:31:01 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x7e) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7ff) fcntl$getflags(r0, 0x401) 18:31:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4a02000000000000]}, 0x2c) 18:31:01 executing program 4: unshare(0x6c060000) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x44f, 0xfaf, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @ipv4}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0x0, 0x400000, 0x7ff]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r7 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x100000000) pwritev(r7, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r6, r7, &(0x7f0000000240), 0x20000102000007) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) 18:31:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1443.266036] IPVS: ftp: loaded support on port[0] = 21 18:31:02 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='T\a'], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000100)="b9d2058bba43b7b7f2a878ac2745c215b7eafc3643a2cc107f92e7d8e43f6775f5a76cb5004fd7b770c5bb238fd1e987ef4231abcf8c7660f0851410fe61b7a55df37077bb1432c1448bbe4940ec66307fdef99da6eab01134e675dcd98a452182d660519daa09b58a066569c360286f480df4d3f66ee58124b552e4e30d5ad1e75e089deb1cd6faefaab41cd713febc9f374b76a5314817428b7f16ea6c28e01f04616e06a446cdba8a2429abb9f5b7e4929a7ef0675b4ef2", 0xb9) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:02 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000a3f000/0x2000)=nil, 0x2000, 0x5, 0x40010, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x480802) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) munmap(&(0x7f0000a3f000/0xf000)=nil, 0xf000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={"6d616e676c65000000000000000000ddffffffffffffff00"}, &(0x7f0000000280)=0x54) 18:31:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3000000]}, 0x2c) 18:31:02 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x5472, &(0x7f0000000040)=0x2) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000000)={0x6, 0x9, 0xfff}) 18:31:02 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) fcntl$notify(r0, 0x402, 0xa) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:31:02 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="207f"], 0x2) close(r0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x401, 0x1, 0x0, 0x1010, 0x2}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x87d, 0x4) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2a030000]}, 0x2c) [ 1443.873126] IPVS: ftp: loaded support on port[0] = 21 18:31:02 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1000, 0x20000) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:02 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff80e8011b837f850b97a5938dc2da77feebe16ea35343a6803cc63316dd8b66631d13ae3fc56538baf64699e90a76a194e3d99f341b0dc5a3476d7cce48af0107c493af879eaf72cd1678b05b935787e4999493e20d2b5f2b4f5545f62fda4d8884ce2acaacd0fce3071d1b5e2c93497eec6814654a47cd53bc0801592a825335e934b6a40e48640209adc640a89a81a43caa1495356b5c7fb8e310cdac8d4651ad66d0e7b701c0589dfa46ea20103c919e55c75e963d81a5ece95fda417e4ac3eb853a9b3aa495e3c8"], 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:31:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x94030000]}, 0x2c) 18:31:02 executing program 0: r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2, r1}) r2 = socket$inet(0x10, 0x800000000003, 0x0) sendmsg(r2, &(0x7f0000000200)={0x0, 0xffffffffffffff0f, &(0x7f0000000380)=[{&(0x7f0000000240)="9ea0dc73362a90231c4b912c1bc327eac65c6b30f27b5881c5412b930b4c5fcd0ee66214dd3cd3028412e4ac328d18d46b7e85"}, {&(0x7f0000000280)="c7548bce325531b0a09f9d183dd1c9233468a13adf3d0808ec0a97f75e50e88ee6534f3e46253a68c054244e54a433e7d453a4fe188a27a4a5e7eb78cf7a6a376cfd06aad4ad5e2b3d0e16f0089d30f9103a9e877f826a538b8ea64d45dcfb0ff543680a807f05734cc407fdf5f1d4e2d7ce8515282d3c72a6b4306ceb22e8683a5b1aec412b97a5bc10478b16c07f77f7fed3ba3b184532d6c2c3dfcf4003cab9b314bb632087498f9a7705c902cd44c07be80bd1977d1563d9c333403b0bea7c1d7bdb9a0983e2758e4313d039ef41e91543d1490c6d1b833758d5b5d06e4b"}], 0x1, 0x0, 0x0, 0x40000}, 0x0) unshare(0x6c060000) getsockname$inet(r2, &(0x7f00000003c0)={0x2, 0x0, @empty}, &(0x7f0000000400)=0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f00000001c0)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:02 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) fremovexattr(r0, &(0x7f0000000080)=@known='trusted.overlay.origin\x00') ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sched_setscheduler(r0, 0x7, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0x1, 0x0, 0x58c4, 0x0, 0x2, 0x8000, 0x1, 0x8, 0x1000, 0x89, 0x4, 0x6}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x11000000]}, 0x2c) 18:31:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1444.429969] IPVS: ftp: loaded support on port[0] = 21 18:31:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6a030000]}, 0x2c) 18:31:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0xfffffffffffffffa, 0x800000000000, 0x2, 0x9}) 18:31:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x26]}, 0x2c) 18:31:03 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff80e8011b837f850b97a5938dc2da77feebe16ea35343a6803cc63316dd8b66631d13ae3fc56538baf64699e90a76a194e3d99f341b0dc5a3476d7cce48af0107c493af879eaf72cd1678b05b935787e4999493e20d2b5f2b4f5545f62fda4d8884ce2acaacd0fce3071d1b5e2c93497eec6814654a47cd53bc0801592a825335e934b6a40e48640209adc640a89a81a43caa1495356b5c7fb8e310cdac8d4651ad66d0e7b701c0589dfa46ea20103c919e55c75e963d81a5ece95fda417e4ac3eb853a9b3aa495e3c8"], 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:31:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r2, 0x80000, r1}) socket$pptp(0x18, 0x1, 0x2) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb202000000000000]}, 0x2c) 18:31:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:04 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000100)=0x7, &(0x7f0000000200)=0x2) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000840)={0x4, 0x4, 0x8, 'queue0\x00', 0x81}) r4 = syz_open_dev$adsp(&(0x7f0000000800)='/dev/adsp#\x00', 0xfffffffffffffad0, 0x10101) write$binfmt_elf64(r3, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffe, 0x1, 0xa82, 0x80000001, 0x6, 0x3, 0x3, 0x2, 0x2a6, 0x40, 0x80, 0x3, 0x9, 0x38, 0x2, 0x2, 0x7751, 0x7fffffff}, [{0x7, 0xcf6, 0x5, 0x5, 0x6, 0x1, 0xffffffff, 0x101}, {0x4, 0x0, 0x8, 0x8, 0x400, 0xfffffffffffffffb, 0x204, 0xbdd}], "33cc413c0fed42f5b3aa78f436af4dfc941c2db30b050caf0fb3cd8a2ffe72071480188df29e75b700c4d2ea94773c706f2ecdc06c332ccce7df77537895073ddc50e10a740c29857191f03fad269809c1b037321765a45724aab42e254c0599f807d53a54233657aad9e5c81e87d008aa9700a93843753d7df7c4d2c01df02cc1e437199ffedd866926ca49769220775c66e96c1f", [[], [], [], [], [], []]}, 0x745) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000900)=@assoc_id=0x0, &(0x7f0000000940)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000009c0)={r5, 0x20, &(0x7f0000000980)=[@in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e24, @empty}]}, &(0x7f0000000a00)=0xc) ioctl$int_in(r3, 0x80004040045013, &(0x7f0000000040)=0x5) 18:31:04 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff80e8011b837f850b97a5938dc2da77feebe16ea35343a6803cc63316dd8b66631d13ae3fc56538baf64699e90a76a194e3d99f341b0dc5a3476d7cce48af0107c493af879eaf72cd1678b05b935787e4999493e20d2b5f2b4f5545f62fda4d8884ce2acaacd0fce3071d1b5e2c93497eec6814654a47cd53bc0801592a825335e934b6a40e48640209adc640a89a81a43caa1495356b5c7fb8e310cdac8d4651ad66d0e7b701c0589dfa46ea20103c919e55c75e963d81a5ece95fda417e4ac3eb853a9b3aa495e3c8"], 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) 18:31:04 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000956000/0x3000)=nil, 0x3000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x800) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000001400)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000001440)={@ipv4={[], [], @multicast1}, 0x0}, &(0x7f0000001480)=0x14) getsockname$packet(r0, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001780)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000017c0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001900)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000001a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000001b40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001cc0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003c40)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000003d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003d80)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000003e80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003ec0)={'sit0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000003fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004000)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000004100)={@rand_addr, @multicast2, 0x0}, &(0x7f0000004140)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004680)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000004640)={&(0x7f0000004180)={0x49c, r1, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x194, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x1e4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}]}}]}, 0x49c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000013c0)={0x7ff00, 0xb, 0x2}) sendmsg$nl_netfilter(r0, &(0x7f0000001380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f0000001340)={&(0x7f0000000200)={0x1118, 0x5, 0x7, 0x0, 0x634b, 0x25dfdbfe, {0x3, 0x0, 0x9}, [@typed={0x1c, 0x10, @str='\\ppp1GPL.]trustedem0\x00'}, @typed={0x8, 0x20, @pid}, @nested={0x10, 0x34, [@typed={0x4, 0x69}, @typed={0x8, 0x7a, @u32=0x20}]}, @typed={0x10, 0x4b, @binary="c1ac4b60d6bd4ceeb7"}, @generic="13941ef4861572481e42d5b6c40a9660bf15cf23055c54d341fb2e76a3f16e7e90fae3b01a4fbe910e8de0cc771d4d48e7f988ba88ab7f4ece8e41b7e5cada2e19678abf1a79b15c9b63e30f087a50dd8cdd52e379c0c0a5e8f094b9ba4465d4488da204e2cb65010a31ecc31d89fc0efbf480e1d18579638a023d2cc21c2c64ded7e34d5dbc774ab5804cf89352585b58dffe87bcf454f589c3f09b6aaada", @typed={0x8, 0x5, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}}, @generic="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", @nested={0x18, 0x23, [@typed={0x8, 0x2b, @ipv4=@loopback}, @typed={0xc, 0x3f, @u64=0x1}]}]}, 0x1118}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r14 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r14, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f00000001c0)=0x164) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/127) 18:31:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, 0x0, 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1445.565590] IPVS: ftp: loaded support on port[0] = 21 18:31:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xde03000000000000]}, 0x2c) 18:31:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:04 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_create1(0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x8f, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x2c) 18:31:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x80ffff]}, 0x2c) 18:31:04 executing program 4: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:04 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x84200}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004180)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000004280)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000042c0)={@remote, 0x4b, r3}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x3, 0x3f5}) 18:31:04 executing program 0: unshare(0x6c060000) r0 = socket$unix(0x1, 0x7, 0x0) mmap(&(0x7f000090d000/0x2000)=nil, 0x2000, 0x4, 0x8030, r0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x143, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00\x00\x00 \x00'}, &(0x7f0000000140)=0x54) 18:31:05 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6e03]}, 0x2c) [ 1446.428857] IPVS: ftp: loaded support on port[0] = 21 18:31:06 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:06 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x20400, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ff5d804cbfb226d0b43203f11295993753341c80c33915d33c78cbda831880f14eaeddb5cec3e91a2c1e45d990c86c9b6d166ed6144784c563362d80f8e420d97bcccd5028becdac84bed8d2dfe6295b8fcf28cceac9a8dba2aa8e73c6aff0ad2775894ebb693ffaa8b921"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000040)={r2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='{md5sumkeyring\x00', r0}, 0x10) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x9, 0x4) 18:31:06 executing program 3: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6832b8400898e79c9b2079aa9fb6b26edbef3d7921186892a3f7f77ca54e6a0b6044d43dffff7a8a029f46eed513474dc074148051110ad4477ac5df545158d1d3c3314d25d0b43bd9c8e896e2c6a7e4122efe76c4f34826175c61a3"], 0x2) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$inet6(0xa, 0x805, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000340)=0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f0000000300), 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000400)=""/168, 0xfffffffffffffcc0) r1 = getpid() capset(&(0x7f00000004c0)={0x200f1526, r1}, &(0x7f0000000280)={0x0, 0x200, 0xffffffff, 0x1, 0x0, 0x4}) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x15555602, 0x9) sysinfo(&(0x7f0000000780)=""/224) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000640)=0x9013, 0x4) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f00000005c0)=0x7, 0x4) unshare(0x40000000) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x3) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x400000f, &(0x7f0000000c00)="6ef45a702210c22bbada037409e8783d58bdbe8a88540000abeca76c99054eb201f80e55bfc832f31a4fede1ff8b4d8a6f4b8d67335680ec7da63731ba194fcd8572f66c1de6bde4a70643c5859d967a5f8316f8fdbf59760824dd98", 0x5c) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000e80)=""/237) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x8}, 0x2ed) splice(0xffffffffffffffff, &(0x7f0000000bc0), 0xffffffffffffffff, &(0x7f0000000b80), 0x2, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)='E', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x8dffffff]}, 0x9}, 0x1c) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000600)={0xfffffffffffffef8, 0x5, 0x0, {0x0, 0x4, 0x0, 0x6}}, 0x30) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000880)=ANY=[], &(0x7f0000000a40)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000a80), &(0x7f0000000ac0)=0x8) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x44081, &(0x7f00000002c0)={0x2, 0x4e24, @loopback}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) 18:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3dc]}, 0x2c) 18:31:06 executing program 4 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, &(0x7f0000000c00)="a37f72345d1ca2338ecb027070d9838c97caf251c5a975d424849da5006fb6a727576349a3ddea7c2a99676c2047a0ee154e187fb6f99d67278e978308ca8bfbbd37a3b0e0eee62abc1f77c8cfb900922794cb9880b867f6dbbed3fb5cd58338f1bf4ddcdaf62a814b9f36485a49aa6dcd291655fcea93efae20d693a67acc7a9e4b1c4d8584236cc6e86f675e0a4ebb734bc9815b10fe034b9f9755e7b8") mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000240)={0x732, {0x6, 0x10000000000, 0x0, 0x2, 0x8}}) mount(&(0x7f0000000240), &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)='proc\x00', 0x0, &(0x7f0000000d40)='SET\x00') unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x7}, 0x8) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3a6]}, 0x2c) [ 1447.419065] FAULT_INJECTION: forcing a failure. [ 1447.419065] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.532237] CPU: 0 PID: 2198 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #265 [ 1447.538419] IPVS: ftp: loaded support on port[0] = 21 [ 1447.539593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1447.539601] Call Trace: [ 1447.539629] dump_stack+0x244/0x39d [ 1447.539655] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1447.539681] ? debug_smp_processor_id+0x1c/0x20 [ 1447.539699] ? perf_trace_lock+0x14d/0x7a0 [ 1447.539725] should_fail.cold.4+0xa/0x17 [ 1447.578694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1447.583820] ? __f_unlock_pos+0x19/0x20 [ 1447.587825] ? lock_downgrade+0x900/0x900 [ 1447.592004] ? proc_fail_nth_write+0x9e/0x210 [ 1447.596541] ? find_held_lock+0x36/0x1c0 [ 1447.600650] ? mwifiex_scan_networks+0x45b8/0x46e0 [ 1447.605618] ? perf_trace_sched_process_exec+0x860/0x860 [ 1447.611098] ? check_preemption_disabled+0x48/0x280 [ 1447.616155] __should_failslab+0x124/0x180 [ 1447.620427] should_failslab+0x9/0x14 [ 1447.624254] kmem_cache_alloc+0x2be/0x730 [ 1447.628450] ? do_fast_syscall_32+0x150/0xfb2 [ 1447.632986] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1447.637606] getname_flags+0xd0/0x590 [ 1447.641615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1447.647186] __ia32_compat_sys_execveat+0xd4/0x140 [ 1447.652156] do_fast_syscall_32+0x34d/0xfb2 [ 1447.656510] ? do_int80_syscall_32+0x890/0x890 [ 1447.661125] ? entry_SYSENTER_compat+0x68/0x7f [ 1447.665736] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1447.670781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1447.675647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1447.680521] ? trace_hardirqs_on_caller+0x310/0x310 [ 1447.685574] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1447.690622] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1447.695682] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1447.700568] entry_SYSENTER_compat+0x70/0x7f [ 1447.705000] RIP: 0023:0xf7faaa29 [ 1447.708393] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 18:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2000000000000]}, 0x2c) 18:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x12020000]}, 0x2c) 18:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1400]}, 0x2c) [ 1447.727331] RSP: 002b:00000000f5fa60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1447.735160] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1447.742454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1447.749750] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1447.757046] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1447.764345] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xda030000]}, 0x2c) 18:31:06 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) signalfd(r0, &(0x7f0000000080)={0x60}, 0x8) ioctl$int_in(r0, 0x80004040045014, &(0x7f0000000040)=0x7) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) 18:31:06 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ed1b7a58f108ff10070000000000000020"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) [ 1448.205656] IPVS: ftp: loaded support on port[0] = 21 18:31:06 executing program 3 (fault-call:3 fault-nth:0): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:06 executing program 4 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:06 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d41b88d3d356203aab1d203ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_RUN(r1, 0xae80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, 0x0, 0x0) [ 1448.405699] FAULT_INJECTION: forcing a failure. [ 1448.405699] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.436085] CPU: 1 PID: 2245 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #265 [ 1448.443419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.452800] Call Trace: [ 1448.455426] dump_stack+0x244/0x39d [ 1448.459094] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1448.464345] ? debug_smp_processor_id+0x1c/0x20 [ 1448.469051] ? perf_trace_lock+0x14d/0x7a0 [ 1448.473346] should_fail.cold.4+0xa/0x17 [ 1448.477444] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1448.482572] ? lock_is_held_type+0x210/0x210 [ 1448.487017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.492584] ? zap_class+0x640/0x640 [ 1448.496340] ? mark_held_locks+0xc7/0x130 [ 1448.500522] ? find_held_lock+0x36/0x1c0 [ 1448.504613] ? __lock_is_held+0xb5/0x140 [ 1448.508807] ? perf_trace_sched_process_exec+0x860/0x860 [ 1448.514384] __should_failslab+0x124/0x180 [ 1448.518651] should_failslab+0x9/0x14 [ 1448.522476] kmem_cache_alloc_node_trace+0x270/0x740 [ 1448.527622] __kmalloc_node+0x3c/0x70 [ 1448.531453] kvmalloc_node+0x65/0xf0 [ 1448.535198] alloc_netdev_mqs+0x17b/0xfe0 [ 1448.539377] ? vti6_tnl_xmit.cold.20+0x3a/0x3a [ 1448.543992] ? free_netdev+0x450/0x450 [ 1448.547061] FAULT_INJECTION: forcing a failure. [ 1448.547061] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.547900] ? perf_trace_lock+0x14d/0x7a0 [ 1448.547918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.547938] ? check_preemption_disabled+0x48/0x280 [ 1448.547953] ? zap_class+0x640/0x640 [ 1448.547972] ? lock_is_held_type+0x210/0x210 [ 1448.547993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.548020] ? find_held_lock+0x36/0x1c0 [ 1448.591720] ? zap_class+0x640/0x640 [ 1448.595464] ? ipip6_tunnel_locate+0x283/0xab0 [ 1448.600084] ? lock_downgrade+0x900/0x900 [ 1448.604254] ? check_preemption_disabled+0x48/0x280 [ 1448.609345] ? __lock_is_held+0xb5/0x140 [ 1448.613449] ipip6_tunnel_locate+0x653/0xab0 [ 1448.617888] ? ipip6_tunnel_update+0xab0/0xab0 [ 1448.622506] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1448.628073] ? _copy_from_user+0xdf/0x150 [ 1448.632248] ipip6_tunnel_ioctl+0xe5d/0x23d7 [ 1448.636706] ? sit_init_net+0xc50/0xc50 [ 1448.640705] ? lock_is_held_type+0x210/0x210 [ 1448.645149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.650709] ? check_preemption_disabled+0x48/0x280 [ 1448.655752] ? zap_class+0x640/0x640 [ 1448.659492] ? check_preemption_disabled+0x48/0x280 [ 1448.664528] ? debug_smp_processor_id+0x1c/0x20 [ 1448.669224] ? zap_class+0x640/0x640 [ 1448.672959] ? perf_trace_lock+0x14d/0x7a0 [ 1448.677220] ? find_held_lock+0x36/0x1c0 [ 1448.681359] ? sit_init_net+0xc50/0xc50 [ 1448.685356] dev_ifsioc+0x41d/0xa80 [ 1448.689001] ? dev_ifsioc+0x41d/0xa80 [ 1448.692824] ? register_gifconf+0x70/0x70 [ 1448.696995] dev_ioctl+0x698/0xcc0 [ 1448.700563] compat_ifr_data_ioctl+0x110/0x170 [ 1448.705178] ? sock_alloc_file+0x180/0x180 [ 1448.709456] compat_sock_ioctl+0x39d/0x1fe0 [ 1448.713814] ? sock_unregister+0x160/0x160 [ 1448.718081] ? kasan_check_write+0x14/0x20 [ 1448.722343] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1448.727324] ? wait_for_completion+0x8a0/0x8a0 [ 1448.731948] ? __fget_light+0x2e9/0x430 [ 1448.735944] ? fget_raw+0x20/0x20 [ 1448.739420] ? __sb_end_write+0xd9/0x110 [ 1448.743508] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1448.749077] ? fput+0x130/0x1a0 [ 1448.752382] ? do_fast_syscall_32+0x150/0xfb2 [ 1448.756898] ? do_fast_syscall_32+0x150/0xfb2 [ 1448.761416] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1448.766029] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1448.771250] ? sock_unregister+0x160/0x160 [ 1448.775527] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1448.780343] do_fast_syscall_32+0x34d/0xfb2 [ 1448.784695] ? do_int80_syscall_32+0x890/0x890 [ 1448.789319] ? entry_SYSENTER_compat+0x68/0x7f [ 1448.793924] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1448.798961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1448.803823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1448.808688] ? trace_hardirqs_on_caller+0x310/0x310 [ 1448.813733] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1448.818816] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1448.823860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1448.828732] entry_SYSENTER_compat+0x70/0x7f [ 1448.833160] RIP: 0023:0xf7fb2a29 [ 1448.836543] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1448.855470] RSP: 002b:00000000f5fae0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1448.863206] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000000089f1 [ 1448.870498] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 1448.877784] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1448.885071] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1448.892372] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1448.910888] CPU: 0 PID: 2246 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #265 [ 1448.918216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.927585] Call Trace: [ 1448.927610] dump_stack+0x244/0x39d [ 1448.927633] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1448.927655] ? debug_smp_processor_id+0x1c/0x20 [ 1448.927674] ? perf_trace_lock+0x14d/0x7a0 [ 1448.927698] should_fail.cold.4+0xa/0x17 [ 1448.948040] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1448.948071] ? __lock_acquire+0x62f/0x4c20 [ 1448.948096] ? __lock_acquire+0x62f/0x4c20 [ 1448.948118] ? find_held_lock+0x36/0x1c0 [ 1448.957332] ? perf_trace_sched_process_exec+0x860/0x860 [ 1448.957352] ? debug_smp_processor_id+0x1c/0x20 [ 1448.957380] __should_failslab+0x124/0x180 [ 1448.957402] should_failslab+0x9/0x14 [ 1448.957419] kmem_cache_alloc+0x2be/0x730 [ 1448.957437] ? lock_is_held_type+0x210/0x210 [ 1448.957455] ? zap_class+0x640/0x640 [ 1448.969997] dup_fd+0x11c/0xf50 [ 1448.970015] ? perf_trace_lock+0x14d/0x7a0 [ 1448.970039] ? __fdget+0x20/0x20 [ 1448.970054] ? find_held_lock+0x36/0x1c0 [ 1448.970084] ? is_bpf_text_address+0xac/0x170 [ 1448.970104] ? lock_downgrade+0x900/0x900 [ 1448.980245] ? check_preemption_disabled+0x48/0x280 [ 1448.980268] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1448.988339] ? kasan_check_read+0x11/0x20 [ 1448.988356] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1448.988370] ? rcu_softirq_qs+0x20/0x20 [ 1448.988385] ? rcu_softirq_qs+0x20/0x20 [ 1448.988399] ? unwind_dump+0x190/0x190 [ 1448.988423] unshare_fd+0x200/0x2c0 [ 1448.988442] ? mmdrop_async_fn+0x20/0x20 [ 1448.988465] ? kernel_text_address+0x79/0xf0 [ 1448.997027] ? __kernel_text_address+0xd/0x40 [ 1448.997046] ? unwind_get_return_address+0x61/0xa0 [ 1448.997067] ? __save_stack_trace+0x8d/0xf0 [ 1448.997094] unshare_files+0xab/0x2d0 [ 1448.997113] ? __ia32_sys_unshare+0x40/0x40 [ 1449.004118] ? save_stack+0x43/0xd0 [ 1449.004136] ? kasan_kmalloc+0xc7/0xe0 [ 1449.004152] ? kasan_slab_alloc+0x12/0x20 [ 1449.004181] __do_execve_file.isra.33+0x360/0x25d0 [ 1449.011799] ? prepare_bprm_creds+0x120/0x120 [ 1449.011823] ? usercopy_warn+0x110/0x110 [ 1449.011854] ? check_preemption_disabled+0x48/0x280 [ 1449.020418] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1449.020448] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1449.029619] ? strncpy_from_user+0x411/0x5a0 [ 1449.029647] ? digsig_verify+0x1530/0x1530 [ 1449.029664] ? kmem_cache_alloc+0x33a/0x730 [ 1449.029690] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1449.038789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.038814] __ia32_compat_sys_execveat+0xf3/0x140 [ 1449.038839] do_fast_syscall_32+0x34d/0xfb2 [ 1449.038865] ? do_int80_syscall_32+0x890/0x890 [ 1449.038887] ? entry_SYSENTER_compat+0x68/0x7f [ 1449.059656] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1449.068121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.068136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.068154] ? trace_hardirqs_on_caller+0x310/0x310 [ 1449.068172] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1449.068194] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1449.081962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.081991] entry_SYSENTER_compat+0x70/0x7f [ 1449.082005] RIP: 0023:0xf7faaa29 [ 1449.082024] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1449.090157] RSP: 002b:00000000f5fa60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1449.097665] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1449.097675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1449.097684] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1449.097693] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1449.097702] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1449.137722] IPVS: ftp: loaded support on port[0] = 21 18:31:10 executing program 0: unshare(0x40000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @empty}}, &(0x7f0000000100)=0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) fchdir(r2) 18:31:10 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0x5, "1de7976830fffce7610a94702941c095924d86d3f8cf960df97c28b685704db1", 0x20, 0x7, 0x2, 0x14, 0x7}) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf4000000]}, 0x2c) 18:31:10 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="ff08c3680cde2ae178321fa32d20c0e200"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000080)={0x4, 0x2d7, 0x2}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) get_thread_area(&(0x7f0000000140)={0x8000000000, 0x20001000, 0xffffffffffffffff, 0x1, 0x7fff, 0x20, 0x2, 0x7, 0x229e, 0x4245}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000000c0)={0x1}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:10 executing program 3 (fault-call:3 fault-nth:1): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:10 executing program 4 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:10 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8720"], 0x2) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000380)={0x0, @reserved}) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000100)={0x2, 0x100000000}, 0x2) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100001}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00002bbd7000fddbdf25020000000c00034a00f9ffffffffffff0c000200860500d8a706c06c37112b1e5a5700000000000c0008dc978d91538c3130000cd80fb2a2d8b79682da0d487a9f29a90008000900bc0000000000"], 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) recvmsg$kcm(r1, &(0x7f0000000780)={&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000540)=""/253, 0xfd}, {&(0x7f0000000640)=""/112, 0x70}], 0x3, &(0x7f00000006c0)=""/141, 0x8d, 0x5}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)=@ipv6_deladdr={0x80, 0x15, 0x300, 0x70bd28, 0x25dfdbfb, {0xa, 0x3f, 0x100, 0xff, r3}, [@IFA_FLAGS={0x8, 0x8, 0x2}, @IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @multicast1}}, @IFA_FLAGS={0x8, 0x8, 0x8}, @IFA_ADDRESS={0x14, 0x1, @ipv4={[], [], @empty}}, @IFA_FLAGS={0x8, 0x8, 0x400}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x1e}}]}, 0x80}, 0x1, 0x0, 0x0, 0x4800}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0xfffffffffffffd74) [ 1451.891246] FAULT_INJECTION: forcing a failure. [ 1451.891246] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.900655] FAULT_INJECTION: forcing a failure. [ 1451.900655] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.925881] CPU: 0 PID: 2265 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #265 [ 1451.933205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.942575] Call Trace: [ 1451.945182] dump_stack+0x244/0x39d [ 1451.948834] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1451.954058] ? find_held_lock+0x36/0x1c0 [ 1451.958150] should_fail.cold.4+0xa/0x17 [ 1451.962233] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1451.967359] ? zap_class+0x640/0x640 [ 1451.971093] ? find_next_bit+0x104/0x130 [ 1451.975187] ? kasan_check_write+0x14/0x20 [ 1451.979439] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1451.984387] ? zap_class+0x640/0x640 [ 1451.988116] ? wait_for_completion+0x8a0/0x8a0 [ 1451.992722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.998269] ? check_preemption_disabled+0x48/0x280 [ 1451.998309] ? __lock_is_held+0xb5/0x140 [ 1451.998340] __should_failslab+0x124/0x180 [ 1451.998362] should_failslab+0x9/0x14 [ 1452.015461] kmem_cache_alloc_trace+0x4b/0x750 [ 1452.020073] __hw_addr_create_ex+0xb2/0x3f0 [ 1452.024414] ? dev_mc_init+0x170/0x170 [ 1452.028339] __hw_addr_add_ex+0x1ef/0x2b0 [ 1452.032511] dev_addr_init+0x169/0x260 [ 1452.036422] ? __hw_addr_add_ex+0x2b0/0x2b0 [ 1452.040763] ? kasan_unpoison_shadow+0x35/0x50 [ 1452.045362] ? kasan_kmalloc+0xc7/0xe0 [ 1452.049270] ? __kmalloc_node+0x50/0x70 [ 1452.053299] alloc_netdev_mqs+0x21b/0xfe0 [ 1452.057464] ? vti6_tnl_xmit.cold.20+0x3a/0x3a [ 1452.062069] ? free_netdev+0x450/0x450 [ 1452.065971] ? perf_trace_lock+0x14d/0x7a0 [ 1452.070222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.075776] ? check_preemption_disabled+0x48/0x280 [ 1452.080807] ? zap_class+0x640/0x640 [ 1452.084534] ? lock_is_held_type+0x210/0x210 [ 1452.088978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.094540] ? find_held_lock+0x36/0x1c0 [ 1452.098625] ? zap_class+0x640/0x640 [ 1452.102360] ? ipip6_tunnel_locate+0x283/0xab0 [ 1452.106954] ? lock_downgrade+0x900/0x900 [ 1452.111131] ? check_preemption_disabled+0x48/0x280 [ 1452.116185] ? __lock_is_held+0xb5/0x140 [ 1452.120288] ipip6_tunnel_locate+0x653/0xab0 [ 1452.124726] ? ipip6_tunnel_update+0xab0/0xab0 [ 1452.129338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1452.134890] ? _copy_from_user+0xdf/0x150 [ 1452.139061] ipip6_tunnel_ioctl+0xe5d/0x23d7 [ 1452.143494] ? sit_init_net+0xc50/0xc50 [ 1452.147484] ? lock_is_held_type+0x210/0x210 [ 1452.151917] ? lock_is_held_type+0x210/0x210 [ 1452.156346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.161949] ? check_preemption_disabled+0x48/0x280 [ 1452.166984] ? zap_class+0x640/0x640 [ 1452.170716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.176267] ? check_preemption_disabled+0x48/0x280 [ 1452.181317] ? debug_smp_processor_id+0x1c/0x20 [ 1452.186004] ? zap_class+0x640/0x640 [ 1452.189734] ? perf_trace_lock+0x14d/0x7a0 [ 1452.193996] ? find_held_lock+0x36/0x1c0 [ 1452.198101] ? sit_init_net+0xc50/0xc50 [ 1452.202090] dev_ifsioc+0x41d/0xa80 [ 1452.205732] ? dev_ifsioc+0x41d/0xa80 [ 1452.209551] ? register_gifconf+0x70/0x70 [ 1452.213726] dev_ioctl+0x698/0xcc0 [ 1452.217296] compat_ifr_data_ioctl+0x110/0x170 [ 1452.221905] ? sock_alloc_file+0x180/0x180 [ 1452.226174] compat_sock_ioctl+0x39d/0x1fe0 [ 1452.230525] ? sock_unregister+0x160/0x160 [ 1452.234787] ? kasan_check_write+0x14/0x20 [ 1452.239053] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1452.244001] ? wait_for_completion+0x8a0/0x8a0 [ 1452.248615] ? __fget_light+0x2e9/0x430 [ 1452.252604] ? fget_raw+0x20/0x20 [ 1452.256081] ? __sb_end_write+0xd9/0x110 [ 1452.260160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1452.265710] ? fput+0x130/0x1a0 [ 1452.269010] ? do_fast_syscall_32+0x150/0xfb2 [ 1452.273518] ? do_fast_syscall_32+0x150/0xfb2 [ 1452.278038] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1452.282639] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1452.287844] ? sock_unregister+0x160/0x160 [ 1452.292100] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1452.296896] do_fast_syscall_32+0x34d/0xfb2 [ 1452.301233] ? do_int80_syscall_32+0x890/0x890 [ 1452.305828] ? entry_SYSENTER_compat+0x68/0x7f [ 1452.310430] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1452.315461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.320320] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.325179] ? trace_hardirqs_on_caller+0x310/0x310 [ 1452.330220] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1452.335253] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1452.340309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.345174] entry_SYSENTER_compat+0x70/0x7f [ 1452.349597] RIP: 0023:0xf7fb2a29 [ 1452.352977] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1452.371891] RSP: 002b:00000000f5fae0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1452.379609] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000000089f1 18:31:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3b4]}, 0x2c) [ 1452.386908] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 1452.394192] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1452.401470] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1452.408748] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1452.432882] CPU: 1 PID: 2263 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #265 [ 1452.440200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.449564] Call Trace: [ 1452.452175] dump_stack+0x244/0x39d [ 1452.455830] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1452.461051] ? debug_smp_processor_id+0x1c/0x20 [ 1452.465743] ? perf_trace_lock+0x14d/0x7a0 [ 1452.470009] should_fail.cold.4+0xa/0x17 [ 1452.474098] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1452.479227] ? __lock_acquire+0x62f/0x4c20 [ 1452.483484] ? __lock_acquire+0x62f/0x4c20 [ 1452.487748] ? find_held_lock+0x36/0x1c0 [ 1452.491851] ? perf_trace_sched_process_exec+0x860/0x860 [ 1452.497325] ? debug_smp_processor_id+0x1c/0x20 [ 1452.502018] __should_failslab+0x124/0x180 [ 1452.506287] should_failslab+0x9/0x14 [ 1452.510103] kmem_cache_alloc+0x2be/0x730 [ 1452.514376] ? print_usage_bug+0xc0/0xc0 [ 1452.518471] ? lock_is_held_type+0x210/0x210 [ 1452.522905] ? zap_class+0x640/0x640 [ 1452.526635] dup_fd+0x11c/0xf50 [ 1452.529952] ? perf_trace_lock+0x14d/0x7a0 [ 1452.534212] ? __fdget+0x20/0x20 [ 1452.537599] ? find_held_lock+0x36/0x1c0 18:31:11 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x10000, 0x0) lseek(r0, 0x0, 0x5) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:11 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x101000) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) [ 1452.541687] ? is_bpf_text_address+0xac/0x170 [ 1452.541707] ? lock_downgrade+0x900/0x900 [ 1452.550343] ? check_preemption_disabled+0x48/0x280 [ 1452.550364] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1452.550380] ? kasan_check_read+0x11/0x20 [ 1452.550394] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1452.550409] ? rcu_softirq_qs+0x20/0x20 [ 1452.550433] ? rcu_softirq_qs+0x20/0x20 [ 1452.550447] ? unwind_dump+0x190/0x190 [ 1452.550469] unshare_fd+0x200/0x2c0 [ 1452.585227] ? mmdrop_async_fn+0x20/0x20 [ 1452.589322] ? kernel_text_address+0x79/0xf0 [ 1452.593748] ? __kernel_text_address+0xd/0x40 [ 1452.598258] ? unwind_get_return_address+0x61/0xa0 [ 1452.603213] ? __save_stack_trace+0x8d/0xf0 [ 1452.603239] unshare_files+0xab/0x2d0 [ 1452.603260] ? __ia32_sys_unshare+0x40/0x40 [ 1452.603293] ? save_stack+0x43/0xd0 [ 1452.603310] ? kasan_kmalloc+0xc7/0xe0 [ 1452.603327] ? kasan_slab_alloc+0x12/0x20 [ 1452.603351] __do_execve_file.isra.33+0x360/0x25d0 [ 1452.603382] ? prepare_bprm_creds+0x120/0x120 [ 1452.603405] ? usercopy_warn+0x110/0x110 [ 1452.603434] ? check_preemption_disabled+0x48/0x280 [ 1452.603462] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1452.603486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1452.603508] ? strncpy_from_user+0x411/0x5a0 [ 1452.661520] ? digsig_verify+0x1530/0x1530 [ 1452.665776] ? kmem_cache_alloc+0x33a/0x730 [ 1452.670110] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1452.670135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.670159] __ia32_compat_sys_execveat+0xf3/0x140 [ 1452.670184] do_fast_syscall_32+0x34d/0xfb2 [ 1452.689560] ? do_int80_syscall_32+0x890/0x890 [ 1452.694161] ? entry_SYSENTER_compat+0x68/0x7f [ 1452.698762] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1452.703797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.708663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.713527] ? trace_hardirqs_on_caller+0x310/0x310 [ 1452.718564] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1452.723598] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1452.728632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.733499] entry_SYSENTER_compat+0x70/0x7f [ 1452.737916] RIP: 0023:0xf7faaa29 18:31:11 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000080), &(0x7f0000000100)) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x7) [ 1452.741301] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1452.760218] RSP: 002b:00000000f5fa60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1452.767941] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1452.767952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 18:31:11 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x102, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f00000000c0)=0x2) [ 1452.767961] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1452.767971] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1452.767981] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 18:31:12 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3a4]}, 0x2c) 18:31:12 executing program 4 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:12 executing program 3 (fault-call:3 fault-nth:2): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(r0, 0xe9da, 0x6) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x5476, &(0x7f0000000080)=0x7) 18:31:12 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='/dev/vhci\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00', 0xffffffffffffffff}, 0x30) r0 = getpgrp(0xffffffffffffffff) sched_setscheduler(r0, 0x2, 0x0) init_module(&(0x7f00000001c0)='\x00', 0x1, &(0x7f0000000200)=',\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000180)={0x4, 0x1f, 0x7fffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1454.145398] FAULT_INJECTION: forcing a failure. [ 1454.145398] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.157766] FAULT_INJECTION: forcing a failure. [ 1454.157766] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.181357] CPU: 1 PID: 2311 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #265 [ 1454.188658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.195537] IPVS: ftp: loaded support on port[0] = 21 [ 1454.198715] Call Trace: [ 1454.198744] dump_stack+0x244/0x39d [ 1454.198772] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1454.198802] ? debug_smp_processor_id+0x1c/0x20 [ 1454.198827] ? perf_trace_lock+0x14d/0x7a0 [ 1454.224313] should_fail.cold.4+0xa/0x17 [ 1454.228393] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1454.233530] ? debug_smp_processor_id+0x1c/0x20 [ 1454.238229] ? lock_is_held_type+0x210/0x210 [ 1454.242663] ? kasan_slab_alloc+0x12/0x20 [ 1454.246834] ? dup_fd+0x11c/0xf50 [ 1454.250317] ? unshare_files+0xab/0x2d0 [ 1454.254317] ? __do_execve_file.isra.33+0x360/0x25d0 [ 1454.259430] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 1454.264552] ? find_held_lock+0x36/0x1c0 [ 1454.268658] ? perf_trace_sched_process_exec+0x860/0x860 [ 1454.274121] ? dup_fd+0xa42/0xf50 [ 1454.277590] __should_failslab+0x124/0x180 [ 1454.281843] should_failslab+0x9/0x14 [ 1454.285659] kmem_cache_alloc_trace+0x2d7/0x750 [ 1454.290337] ? do_raw_spin_unlock+0xa7/0x330 [ 1454.294761] ? do_raw_spin_trylock+0x270/0x270 [ 1454.299365] ? __lock_is_held+0xb5/0x140 [ 1454.303444] alloc_fdtable+0x89/0x280 [ 1454.307270] dup_fd+0xa71/0xf50 [ 1454.310576] ? perf_trace_lock+0x14d/0x7a0 [ 1454.314831] ? __fdget+0x20/0x20 [ 1454.318205] ? find_held_lock+0x36/0x1c0 [ 1454.322296] ? is_bpf_text_address+0xac/0x170 [ 1454.326806] ? lock_downgrade+0x900/0x900 [ 1454.330969] ? check_preemption_disabled+0x48/0x280 [ 1454.336002] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1454.340941] ? kasan_check_read+0x11/0x20 [ 1454.345098] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1454.350391] ? rcu_softirq_qs+0x20/0x20 [ 1454.354375] ? rcu_softirq_qs+0x20/0x20 [ 1454.358359] ? unwind_dump+0x190/0x190 [ 1454.362267] unshare_fd+0x200/0x2c0 [ 1454.365921] ? mmdrop_async_fn+0x20/0x20 [ 1454.369990] ? kernel_text_address+0x79/0xf0 [ 1454.374411] ? __kernel_text_address+0xd/0x40 [ 1454.378919] ? unwind_get_return_address+0x61/0xa0 [ 1454.383863] ? __save_stack_trace+0x8d/0xf0 [ 1454.388211] unshare_files+0xab/0x2d0 [ 1454.392026] ? __ia32_sys_unshare+0x40/0x40 [ 1454.396375] ? save_stack+0x43/0xd0 [ 1454.400012] ? kasan_kmalloc+0xc7/0xe0 [ 1454.403917] ? kasan_slab_alloc+0x12/0x20 [ 1454.408089] __do_execve_file.isra.33+0x360/0x25d0 [ 1454.413053] ? prepare_bprm_creds+0x120/0x120 [ 1454.417568] ? usercopy_warn+0x110/0x110 [ 1454.421657] ? check_preemption_disabled+0x48/0x280 [ 1454.426701] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1454.432255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1454.437817] ? strncpy_from_user+0x411/0x5a0 [ 1454.442248] ? digsig_verify+0x1530/0x1530 [ 1454.446503] ? kmem_cache_alloc+0x33a/0x730 [ 1454.450839] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1454.455438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.460991] __ia32_compat_sys_execveat+0xf3/0x140 [ 1454.465950] do_fast_syscall_32+0x34d/0xfb2 [ 1454.470293] ? do_int80_syscall_32+0x890/0x890 [ 1454.474892] ? entry_SYSENTER_compat+0x68/0x7f [ 1454.479485] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1454.484516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.489368] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.494221] ? trace_hardirqs_on_caller+0x310/0x310 [ 1454.499265] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1454.504316] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1454.509349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.514216] entry_SYSENTER_compat+0x70/0x7f [ 1454.518630] RIP: 0023:0xf7faaa29 [ 1454.522005] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1454.540912] RSP: 002b:00000000f5fa60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1454.548627] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1454.555918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1454.563191] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1454.570467] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1454.577748] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1454.585223] CPU: 0 PID: 2307 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #265 [ 1454.592534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.601903] Call Trace: [ 1454.604512] dump_stack+0x244/0x39d [ 1454.608171] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1454.613396] ? debug_smp_processor_id+0x1c/0x20 [ 1454.618075] ? perf_trace_lock+0x14d/0x7a0 [ 1454.622335] should_fail.cold.4+0xa/0x17 [ 1454.626425] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1454.631555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.637114] ? check_preemption_disabled+0x48/0x280 [ 1454.642154] ? zap_class+0x640/0x640 [ 1454.645898] ? find_held_lock+0x36/0x1c0 [ 1454.649979] ? __lock_is_held+0xb5/0x140 [ 1454.654074] ? perf_trace_sched_process_exec+0x860/0x860 [ 1454.659565] __should_failslab+0x124/0x180 [ 1454.663824] should_failslab+0x9/0x14 [ 1454.667647] kmem_cache_alloc_node_trace+0x270/0x740 [ 1454.672770] ? __hw_addr_add_ex+0x2b0/0x2b0 [ 1454.677111] ? kasan_unpoison_shadow+0x35/0x50 [ 1454.681718] __kmalloc_node+0x3c/0x70 [ 1454.685552] kvmalloc_node+0x65/0xf0 [ 1454.689297] alloc_netdev_mqs+0x85a/0xfe0 [ 1454.693464] ? vti6_tnl_xmit.cold.20+0x3a/0x3a [ 1454.698076] ? free_netdev+0x450/0x450 [ 1454.701977] ? perf_trace_lock+0x14d/0x7a0 [ 1454.706229] ? check_preemption_disabled+0x48/0x280 [ 1454.711265] ? zap_class+0x640/0x640 [ 1454.715017] ? lock_is_held_type+0x210/0x210 [ 1454.719448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.725012] ? find_held_lock+0x36/0x1c0 [ 1454.729094] ? zap_class+0x640/0x640 [ 1454.732838] ? ipip6_tunnel_locate+0x283/0xab0 [ 1454.737443] ? lock_downgrade+0x900/0x900 [ 1454.741618] ? check_preemption_disabled+0x48/0x280 [ 1454.746657] ? __lock_is_held+0xb5/0x140 [ 1454.750756] ipip6_tunnel_locate+0x653/0xab0 [ 1454.755188] ? ipip6_tunnel_update+0xab0/0xab0 [ 1454.759805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1454.765359] ? _copy_from_user+0xdf/0x150 [ 1454.769526] ipip6_tunnel_ioctl+0xe5d/0x23d7 [ 1454.773961] ? sit_init_net+0xc50/0xc50 [ 1454.777956] ? lock_is_held_type+0x210/0x210 [ 1454.782384] ? lock_is_held_type+0x210/0x210 [ 1454.786809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.792364] ? check_preemption_disabled+0x48/0x280 18:31:13 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_delrule={0x58, 0x21, 0x200, 0x70bd28, 0x25dfdbff, {0x2, 0x10, 0x0, 0x8001, 0x5, 0x0, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @loopback}, @FRA_FLOW={0x8, 0xb, 0x4}, @FRA_GENERIC_POLICY=@FRA_L3MDEV={0x8, 0x13, 0x3}, @FRA_FLOW={0x8, 0xb, 0x5}, @FRA_DST={0x8, 0x1, @multicast2}, @FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0xbd}, @FRA_DST={0x8, 0x1, @rand_addr=0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x4801}, 0x4040800) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x25]}, 0x2c) [ 1454.797401] ? zap_class+0x640/0x640 [ 1454.801127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.806680] ? check_preemption_disabled+0x48/0x280 [ 1454.811731] ? debug_smp_processor_id+0x1c/0x20 [ 1454.816422] ? zap_class+0x640/0x640 [ 1454.820153] ? perf_trace_lock+0x14d/0x7a0 [ 1454.824411] ? find_held_lock+0x36/0x1c0 [ 1454.828518] ? sit_init_net+0xc50/0xc50 [ 1454.832514] dev_ifsioc+0x41d/0xa80 [ 1454.836160] ? dev_ifsioc+0x41d/0xa80 [ 1454.839970] ? register_gifconf+0x70/0x70 [ 1454.844168] dev_ioctl+0x698/0xcc0 18:31:13 executing program 4 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1454.847726] compat_ifr_data_ioctl+0x110/0x170 [ 1454.847745] ? sock_alloc_file+0x180/0x180 [ 1454.847780] compat_sock_ioctl+0x39d/0x1fe0 [ 1454.847806] ? sock_unregister+0x160/0x160 [ 1454.865171] ? kasan_check_write+0x14/0x20 [ 1454.869426] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1454.874375] ? wait_for_completion+0x8a0/0x8a0 [ 1454.874412] ? __fget_light+0x2e9/0x430 [ 1454.874430] ? fget_raw+0x20/0x20 [ 1454.886435] ? __sb_end_write+0xd9/0x110 [ 1454.890518] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1454.896089] ? fput+0x130/0x1a0 [ 1454.896110] ? do_fast_syscall_32+0x150/0xfb2 [ 1454.896128] ? do_fast_syscall_32+0x150/0xfb2 [ 1454.896147] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1454.896169] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1454.903944] ? sock_unregister+0x160/0x160 [ 1454.903962] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1454.903999] do_fast_syscall_32+0x34d/0xfb2 [ 1454.904022] ? do_int80_syscall_32+0x890/0x890 [ 1454.904043] ? entry_SYSENTER_compat+0x68/0x7f [ 1454.940779] ? trace_hardirqs_off_caller+0xbb/0x310 18:31:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc203000000000000]}, 0x2c) [ 1454.945845] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.950702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.955565] ? trace_hardirqs_on_caller+0x310/0x310 [ 1454.960606] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1454.965641] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1454.970679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.970708] entry_SYSENTER_compat+0x70/0x7f [ 1454.970722] RIP: 0023:0xf7fb2a29 18:31:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:13 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="bf000100e2a5bf2109765f90ccc493192fd6dc308aff6535cc061ab81c35cc03f25c"], 0x1f3ea2c) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1454.970739] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1454.970749] RSP: 002b:00000000f5fae0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1454.980004] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000000089f1 [ 1454.980014] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 1454.980023] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1454.980032] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1454.980042] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1455.095561] IPVS: ftp: loaded support on port[0] = 21 18:31:14 executing program 0: unshare(0x6c060000) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000001c0)={0x3, 0xffffffffffffffff, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x54) r2 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup2(r3, r2) keyctl$session_to_parent(0x12) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) r5 = getuid() ioctl$TUNSETOWNER(r4, 0x400454cc, r5) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x19bd}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0xfffffffffffff08a, @mcast2, 0x50}}}, 0x84) 18:31:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4b00000000000000]}, 0x2c) 18:31:14 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x34) readv(r0, &(0x7f0000000680)=[{&(0x7f00000000c0)=""/242, 0xf2}, {&(0x7f00000001c0)=""/209, 0xd1}, {&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f0000000340)=""/150, 0x96}, {&(0x7f0000000400)=""/209, 0xd1}, {&(0x7f0000000500)=""/180, 0xb4}, {&(0x7f00000005c0)=""/31, 0x1f}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/13, 0xd}], 0x9) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000780)=[r2, 0x0, r2, 0xee00, r2, 0xee00, 0xffffffffffffffff]) write$FUSE_CREATE_OPEN(r0, &(0x7f00000007c0)={0xa0, 0x0, 0x8, {{0x5, 0x3, 0x401, 0xf2, 0x2, 0x6, {0x3, 0x5, 0x6, 0x1, 0x9, 0x2, 0x7, 0xffffffff, 0xda1f, 0x1, 0x1, r1, r3, 0x7fffffff, 0x81}}, {0x0, 0x4}}}, 0xa0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r4, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:14 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2000, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000100)={@broadcast, @multicast1, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000180)={@remote, r2}, 0x14) sched_setscheduler(r0, 0x3, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000040)={0x10}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1455.514670] IPVS: ftp: loaded support on port[0] = 21 18:31:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb4030000]}, 0x2c) 18:31:14 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) 18:31:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:14 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x9, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000100)=""/97) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f00000000c0)=0x1f7) 18:31:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) 18:31:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:14 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0086401, &(0x7f0000000040)={0xe9, &(0x7f0000000100)=""/233}) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:14 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) finit_module(r0, &(0x7f0000000100)='/dev/dsp#\x00', 0x3) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000040), &(0x7f0000000080)=0x4) 18:31:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x32a]}, 0x2c) 18:31:14 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1456.210068] IPVS: ftp: loaded support on port[0] = 21 18:31:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x402c5828, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x515243, 0x0) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:15 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6a03000000000000]}, 0x2c) 18:31:15 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000180)={'mangle\x00'}, &(0x7f0000000080)=0x54) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0x80002) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 18:31:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5460, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:15 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x1) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) 18:31:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd403]}, 0x2c) 18:31:15 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x15a]}, 0x2c) 18:31:15 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:15 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:15 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x405c3, 0x1fffa) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc044565d, &(0x7f00000000c0)={0x7, 0xf, 0x4, 0x2000000, {0x0, 0x7530}, {0x7, 0x1, 0x9fb5, 0x3, 0x1, 0x4f6, "0ab84caf"}, 0x1f, 0x1, @planes=&(0x7f0000000000)={0xfff, 0x10001, @fd=r0}, 0x4}) [ 1457.193739] IPVS: ftp: loaded support on port[0] = 21 18:31:15 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff50"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xffff8000]}, 0x2c) 18:31:16 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x80000000, 0x80000) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000200)={@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}, 0x2, 0x4, 0x3, 0x4}}, {&(0x7f0000000100)=""/180, 0xb4}, &(0x7f00000001c0), 0xc}, 0x9c) 18:31:16 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) sched_getscheduler(r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x4) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x2) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x730, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000090}, 0x4008000) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) pipe2(&(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f00000003c0)={0x7fffffff, 0x63, 0x78, 0x0, 0x0, 0x4141}) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1058) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:16 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000800)='/dev/input/mouse#\x00', 0x0, 0x240200) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000840)={0x10000000000, 0x8, 0x8, 0x1b, 0x7, 0x1, 0x8001, 0x2, 0x0}, &(0x7f0000000880)=0x20) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={r1, 0x9, 0x1}, 0xc) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x61) write$binfmt_aout(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0b01000100020009b30000000000001c68f86800008b00000000000000000000"], 0x20) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000900)='trusted.overlay.nlink\x00', &(0x7f0000000940)={'L-', 0x11}, 0x28, 0x2) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000200)=0xe8) r6 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) getgroups(0x4, &(0x7f0000000500)=[0xee00, 0x0, 0xee00, 0x0]) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000740)={0x0, 0x6f8}, &(0x7f0000000780)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000007c0)={r10, 0x4, 0x20}, 0xc) getresgid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {0x1, 0x7}, [{0x2, 0x2, r4}, {0x2, 0x5, r5}, {0x2, 0x1, r6}, {0x2, 0x0, r7}], {0x4, 0x2}, [{0x8, 0x0, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r11}], {0x10, 0x3}, {0x20, 0x3}}, 0x5c, 0x2) uselib(&(0x7f00000001c0)='./file0\x00') ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000980)={'yam0\x00', @local}) ioctl$int_in(r2, 0x8000404004500f, &(0x7f0000000080)=0x2000000000007) io_setup(0x3, &(0x7f0000000a00)) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000009c0)=0x2, 0x4) 18:31:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x2c) 18:31:16 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) socket$inet(0x2, 0x2, 0x325) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xca020000]}, 0x2c) 18:31:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1458.028960] IPVS: ftp: loaded support on port[0] = 21 18:31:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2]}, 0x2c) 18:31:16 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000240)={0x1}, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/90, 0x5a, 0x0}}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) lsetxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f0000000340)=@sha1={0x1, "eb81e0a7c9f1211681a99d20ac38175e00bea0d4"}, 0x15, 0x2) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x100010, r0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r0, 0x10, &(0x7f00000001c0)={&(0x7f0000000040)=""/116, 0x74, r1}}, 0x10) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000280)) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000003c0)) 18:31:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2f00) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8911, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xdf03000000000000]}, 0x2c) 18:31:17 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000080)={@multicast1, @dev, 0x0}, &(0x7f00000000c0)=0xc) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@remote, @remote, @ipv4={[], [], @multicast2}, 0x8, 0x1f, 0x9, 0x4000000000400, 0x9, 0x80000042040120, r1}) ioctl$KIOCSOUND(r0, 0x4b2f, 0x100) 18:31:17 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0xc00, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0x50, &(0x7f0000000200)}, 0x10) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000001c0)={0x3, 0x5}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000100)={0x2, "b7dba08d4c9093d9896e1525bcef09610b213a7740f8293ff8fe64ea09a88486", 0x3, 0x1}) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:17 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setscheduler(r0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="fb80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3200000000000000]}, 0x2c) 18:31:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1458.844696] IPVS: ftp: loaded support on port[0] = 21 18:31:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:17 executing program 1: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) setsockopt$inet_tcp_buf(r0, 0x6, 0x2b, &(0x7f0000000100)="09b3196a63d384845479be334cf3007b830afd88332991c79fe94351552526427e7dcd1e3cba47c8742446196ab3dc70dbdb0090e0336c287a7a9ff88a0217a5135cafbe411047acad5fce4c70427cccd0f5186e725443071fbf222cf9fe25c0a80931862c06a13f45173f85bd3f20fa1ef8f149d6afcbda768c8b913384d7a0a9", 0x81) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r1, 0x80004040045010, &(0x7f00000000c0)=0x9) 18:31:17 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8201]}, 0x2c) 18:31:17 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x82, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000300), &(0x7f0000000380)=0x8) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, [@exit, @call={0x85, 0x0, 0x0, 0x3f}, @jmp={0x5, 0x9, 0xf, 0xa, 0xb, 0xfffffffffffffff8, 0xfffffffffffffff0}, @ldst={0x2, 0x2, 0x0, 0x6, 0xa2ba6c1e437eef86, 0xfffffffffffffffe, 0xfffffffffffffff5}, @alu={0x7, 0x13, 0x2, 0x7, 0x4, 0xffffffffffffffe6, 0xfffffffffffffff5}, @exit, @ldst={0x3, 0x775fe2dd3eeba10c, 0x1, 0xd, 0x3, 0xfffffffffffffff0, 0xffffffffffffffff}]}, &(0x7f0000000100)='GPL\x00', 0x9fb, 0x94, &(0x7f0000000140)=""/148, 0x41f00, 0x1, [], r2}, 0x48) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:18 executing program 0: unshare(0x10000) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:18 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2c02]}, 0x2c) 18:31:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:18 executing program 1: r0 = memfd_create(&(0x7f0000000080)='selinuxppp1\x00', 0x7) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0xffffffffffff7fff, 0x3, 0x0, 0x3, 0x743, 0x0, 0x100000000, 0x5, 0x3f, 0x7c, 0x1, 0x2, 0xff80, 0x2, 0x4, 0x14}}) r1 = dup2(r0, r0) ioctl$UI_SET_PHYS(r0, 0x4004556c, &(0x7f0000000180)='syz1\x00') getsockname$packet(r1, &(0x7f0000001a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001ac0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000002000)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001fc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="84040000280000012bbd7000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="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"], 0x484}}, 0x20000815) getsockname$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x10) setsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f00000001c0)=0x5c3, 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r3, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:18 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = fcntl$getown(r2, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000100)={{0x1, 0x0, 0x1, 0x3f, '\x00', 0x3ea}, 0x0, 0x120, 0x100, r3, 0x5, 0x8, 'syz1\x00', &(0x7f0000000040)=['lo,&*proceth0%\\{)\x00', "2629766d6e657430776c616e31766d6e657431217070703025fa76626f786e65743000", '/dev/vhci\x00', '\x00', '/dev/vhci\x00'], 0x4a, [], [0x6, 0x9, 0x3e97, 0x3]}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x146]}, 0x2c) 18:31:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:18 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:18 executing program 0: unshare(0x14040200) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x100, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) getresgid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000440)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680)=0x0, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000800)=0xe8) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000d00)={0x0, 0x7, 0x0, 0x9, 0x200, 0x101}, &(0x7f0000000d40)=0x14) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000d80)={r13, @in={{0x2, 0x4e21, @loopback}}}, 0x84) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000900)={0x3d8, 0x0, 0x2, [{{0x4, 0x3, 0x31, 0x0, 0xfed5, 0x1, {0x5, 0x2, 0x2f2, 0x7, 0xebd, 0x1, 0x3, 0x1, 0x624c, 0x400, 0xa93, r1, r2, 0x9}}, {0x6, 0x6, 0x7, 0x89, 'mangle\x00'}}, {{0x5, 0x3, 0x6, 0x5, 0x6, 0x3, {0x6, 0x5, 0x5, 0x0, 0xffffffff, 0x459, 0x2, 0x3, 0x8b6, 0x3f, 0x9, r3, r4, 0x2, 0x7}}, {0x1, 0xfffffffffffffffc, 0x5, 0xfffffffffffffffc, 'em1\'\\'}}, {{0x2, 0x3, 0x7, 0x9, 0xffffffff, 0x4, {0x5, 0x0, 0x8001, 0x3, 0x7, 0x20, 0x1, 0x62d4614d, 0x80, 0x5, 0xc6f, r5, r6, 0x7ff, 0x7ff}}, {0x6, 0xfffffffffffffff9, 0x1, 0x15, ']'}}, {{0x2, 0x1, 0x1, 0xfffffffffffff800, 0xbe2, 0x6, {0x6, 0x5, 0x894a, 0x5, 0x5, 0x8, 0x0, 0x7645, 0x81, 0x1000, 0x4, r7, r8, 0x10000, 0x9}}, {0x6, 0xfffffffffffff409, 0x7, 0xfffffffffffffffd, 'mangle\x00'}}, {{0x0, 0x1, 0x2, 0x800, 0x704, 0x1, {0x5, 0x0, 0x0, 0x100000000, 0x5d55, 0xfffffffffffffffc, 0xff, 0x6, 0xc1, 0x81, 0x3, r9, r10, 0x6, 0xff}}, {0x1, 0x27, 0x5, 0x7ff, '%proc'}}, {{0x2, 0x1, 0x8b1, 0x8, 0x8, 0xc5, {0x0, 0x8, 0x3, 0x7fff, 0x5, 0x3, 0xf893, 0x9, 0x4c, 0xbfe6, 0x4, r11, r12, 0x2, 0x7f}}, {0x0, 0x6, 0xe, 0xffffffffffffffe1, '/proc}security'}}]}, 0x3d8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r14, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) socket$packet(0x11, 0x3, 0x300) 18:31:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9403000000000000]}, 0x2c) 18:31:18 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x66201, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) ioctl$TIOCSBRK(r0, 0x5427) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x4ad, 0x8000) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000003c0)=0xffffffffffffb800) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x4, 0x9}, &(0x7f00000002c0)=0x88) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={r2, 0x4}, &(0x7f0000000340)=0x8) openat(0xffffffffffffffff, &(0x7f0000000400)='.\x00', 0x4000, 0x42) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x120) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000380)={0x40, 0xffff, 0x1}) 18:31:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:18 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x2) socket$inet6(0xa, 0xfffffffffff5, 0x102) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0xc) write(r3, &(0x7f00000008c0)="130000001000ffdde200f49ff60f050000230a009d000000119dc53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae3c726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025722c962d916c000000000000003400000000000000d5ba641663ac6847d35b8779c6903efd7800e86ccc2b5bbc156c2a1976a0f57350aeb0775fa06f769670fe98", 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) r4 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) fcntl$setown(r2, 0x8, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000002c0)=0xfffffffffffffffe, 0xfffffdc1) ioctl$RTC_PIE_ON(r4, 0x7005) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="30000000310001000000000076690000000000001c00010018001a00000010000100636f6e6e6d61726b0000000000001df0faa62283b863e1f9809bc52e73ef4461f0d95b2d00f5b29c826010ab15a5af4d653fb6936e2fe108fe585829c3ff13c1f06ee434d06b36e9b8acd8627278354ad946b815637d08bae574626b18b63805046cf735c1048dc6dbdaafadf3b076b6f301aac97b8354289979f25626ff0e6534323a05f3c5b36728c76be22b234eb33465602c6e6d5b537bcf38e1f3d2143699872418b713e1c65f5f18bbd8cd22f1c002f6a3279d8d68cbf9f9d2fd5eb8f57a4c618b1ed5ac9a8dcc69e893f232321e67ab7e"], 0x1}}, 0x800) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) 18:31:18 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:18 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0xffffffffffff75d9, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="3f1b2bbd702e59d97897"], 0x1}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x200) 18:31:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x20020000]}, 0x2c) 18:31:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2000000]}, 0x2c) 18:31:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd003]}, 0x2c) 18:31:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1074) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:19 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x8000007) 18:31:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8102]}, 0x2c) 18:31:19 executing program 0: write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x6}, 0x2) unshare(0x6c060000) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100)=0x3, 0x4) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a45321, &(0x7f0000000280)={{0xffffffffffff47b2, 0x10001}, 'port1\x00', 0x8, 0x100850, 0x3f, 0x2, 0x7, 0x8, 0x2, 0x0, 0x7, 0xc0000000}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000400)={'mangle\x00'}, &(0x7f0000000080)=0x54) syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x2, 0x2000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a45321, &(0x7f00000001c0)={{0x0, 0x7}, 'port0\x00', 0x10, 0x802, 0x7, 0x7c, 0x9, 0xffffffffffffffc0, 0x9, 0x0, 0x4}) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000380)={0x0, 0x6, 0x983, 0x8000, 0xfffffffffffffff9, 0x80, 0x7, 0x6, 0xffffffffffffffff, 0x933}) 18:31:19 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r1, 0x9}}, 0x10) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0xd8) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)=r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2ba]}, 0x2c) [ 1460.948895] IPVS: ftp: loaded support on port[0] = 21 18:31:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1200) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3d4]}, 0x2c) 18:31:19 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$TIOCSTI(r0, 0x5412, 0x5) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x3ec6, 0x10000, 0x7}) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x8000) 18:31:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfc030000]}, 0x2c) 18:31:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:19 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) pause() 18:31:20 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/153, 0x99}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f0000000300)=""/187, 0xbb}, {&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f0000000000)=""/25, 0x19}, {&(0x7f0000000440)=""/253, 0xfd}], 0x7) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="00008000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000005c0)=0xc) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000600)={r1, 0x100000001, 0xfe28}, 0x8) 18:31:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x402c582a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xba020000]}, 0x2c) 18:31:20 executing program 0: unshare(0x6c060000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x820040}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x8c, r1, 0x212, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x56f9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1400000000000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x48001}, 0x40000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000400)={0x0, 0xffff}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000480)={r2, 0x1, 0x5, 0x80, 0x7, 0x3}, 0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000004c0), &(0x7f0000000500)=0x4) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:20 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ppp\x00', 0x402102, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x8, 0x9], 0x2, 0xfffffffffffffff7, 0xfffffffffffffffd, 0x4, 0xa39, 0x1ffc00, {0x800, 0x3f, 0x0, 0x4, 0x0, 0xffffffff, 0x5, 0x2, 0x9, 0xc4, 0x8, 0xd32, 0x8, 0x100000000, "c500af3d49d9f8eb544c5a8aa8bfac362d50c0bd12bf4ca44863d692585b58d6"}}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r2, 0x80000, r1}) mq_notify(r1, &(0x7f0000001380)={0x0, 0x27, 0x0, @thr={&(0x7f0000000280)="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", &(0x7f0000001280)="4423f19378b4cce6277d5f9af2ccd5a0fb56ad0135e5796d6cb0e817415b9cc93a332a6c0d021661b931dd504fd3c4dec9bd4b03343c93e4401758c3376138020fb00aed731616c5d60477903630a02c3616e63d98ccf8fe2064595c3557bf7b88c1caa7eadd138c9d612dac5351b8cb7bd75dccc330d6a45469dc23901dca38b8d54c7d40171f737992db987f00575758da305c64999a9ce00c897a65dc0112ce5c9cd5a4f129bc5887efbdefe1bb834e5acdf535d9267b31bb48349d9160541d4d7c5f442de73cf5436c0e2fdc0a"}}) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) ioctl$int_in(r1, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x1, 0xb, 0x3}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000180)=0x4) 18:31:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xdc030000]}, 0x2c) 18:31:20 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) r1 = getpgrp(0x0) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, 0x4, {{0x3, 0x7, 0x3, r1}}}, 0x28) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setpgid(r1, r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1462.208513] IPVS: ftp: loaded support on port[0] = 21 18:31:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa4000000]}, 0x2c) 18:31:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb603]}, 0x2c) 18:31:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) 18:31:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x368]}, 0x2c) [ 1462.908426] IPVS: ftp: loaded support on port[0] = 21 18:31:21 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0xb) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 18:31:21 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) 18:31:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:21 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) lookup_dcookie(0xdca7, &(0x7f00000000c0)=""/168, 0xa8) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_netdev_private(r0, 0x89f3, &(0x7f0000000180)="297eaa4c2fc6857e6fc904") 18:31:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8102000000000000]}, 0x2c) [ 1463.249242] IPVS: ftp: loaded support on port[0] = 21 18:31:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1464.309105] bridge0: port 1(bridge_slave_0) entered blocking state [ 1464.315691] bridge0: port 1(bridge_slave_0) entered disabled state [ 1464.323981] device bridge_slave_0 entered promiscuous mode [ 1464.373537] bridge0: port 2(bridge_slave_1) entered blocking state [ 1464.380138] bridge0: port 2(bridge_slave_1) entered disabled state [ 1464.388187] device bridge_slave_1 entered promiscuous mode [ 1464.437666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1464.485784] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1464.632684] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1464.683481] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1464.845357] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1464.853148] team0: Port device team_slave_0 added [ 1464.883027] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1464.890304] team0: Port device team_slave_1 added [ 1464.918626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1464.949993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1464.981529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1465.026348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1465.367994] bridge0: port 2(bridge_slave_1) entered blocking state [ 1465.374771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1465.381505] bridge0: port 1(bridge_slave_0) entered blocking state [ 1465.387881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1465.395366] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1465.568458] device bridge_slave_1 left promiscuous mode [ 1465.574016] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.582172] device bridge_slave_0 left promiscuous mode [ 1465.588094] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.621292] team0 (unregistering): Port device team_slave_1 removed [ 1465.632707] team0 (unregistering): Port device team_slave_0 removed [ 1465.644734] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1465.656239] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1465.684684] bond0 (unregistering): Released all slaves [ 1466.137812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1467.270381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1467.446141] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1467.621705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1467.628010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1467.635208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1467.791841] 8021q: adding VLAN 0 to HW filter on device team0 18:31:27 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:27 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x800, @loopback, 0x2}, @in={0x2, 0x4e21, @remote}], 0x2c) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa602000000000000]}, 0x2c) 18:31:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc0189436, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000080)={0x2, 0x1, 0x1002, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:27 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x41) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xb3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x7, 0x4, [0xff, 0x800, 0x9, 0x1]}, &(0x7f00000001c0)=0x10) sendfile64(r0, r0, &(0x7f0000000240)=0x45, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x101}, 0x8) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 1468.420795] IPVS: ftp: loaded support on port[0] = 21 18:31:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf000000]}, 0x2c) 18:31:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f9, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:27 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_delroute={0x24, 0x19, 0x2, 0x70bd2c, 0x25dfdbfc, {0x2, 0x14, 0x90, 0x0, 0xff, 0x3, 0xfd, 0x3, 0x800}, [@RTA_UID={0x8, 0x19, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4008890) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000240)) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:27 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) flistxattr(r0, &(0x7f0000000080)=""/245, 0xf5) 18:31:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x5a01]}, 0x2c) 18:31:27 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:27 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd]}, 0x2c) 18:31:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x2c) 18:31:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:28 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0xc4080) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x4020940d, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:28 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0xfffffffffffff000, 0x100) setsockopt$packet_buf(r0, 0x107, 0x7, &(0x7f00000002c0)="2d611b7d6928b703947d26dd494df8198432f7bfa6e57c12b2555ca43c6d0b5b403e01a40273733f3697f30f6b045100e2af5330a51fdb0412dd6472e279212afbfb62ede8cf5b18528e58f6af8a636e8f75e2a03eaf11e92fa39f88c4492c6949e567bdc9048a1d3283776bcf0e95abf1b4be5590ebef4e143d4324d092b7baa2a6c18e552b99b63ed1e070c4a21778829f82a3110c3895fdc027772c9472a35afbfd", 0xa3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x5}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={r1, 0x1}, 0x8) r2 = openat$userio(0xffffffffffffff9c, 0x0, 0xa6a40, 0x0) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x401, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000400)={0x0, 0x8001, [], @bt={0x5, 0x3, 0xd3, 0x5, 0x916, 0x3, 0x2}}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e24, 0xdf31, @mcast1, 0x100000001}, {0xa, 0x4e24, 0x4, @loopback, 0x100000000}, 0xef, [0xffffffffffffc4cb, 0x200, 0x6fe, 0xcff1, 0x20, 0x6, 0x7ff, 0xc996]}, 0x5c) r4 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000380)) ioctl$SCSI_IOCTL_GET_IDLUN(r4, 0x5382, &(0x7f00000003c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={r3, 0x10, &(0x7f00000005c0)={&(0x7f00000004c0)=""/251, 0xfb}}, 0x10) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:28 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) epoll_create1(0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x40000]}, 0x2c) 18:31:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x20000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1469.512925] IPVS: ftp: loaded support on port[0] = 21 18:31:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x107a) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:28 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000080)=0x7) 18:31:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8971, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6e030000]}, 0x2c) 18:31:28 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff808c43d98c7576cdd77fda098228129623f2671e386a54de98cd9578f7cb45d8b08696eb22"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x2c) 18:31:28 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:28 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f7, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:29 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffe, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000100)={0x10001, 0x800, 0x9}) ioctl$int_in(r0, 0x80004040045010, &(0x7f00000000c0)=0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x41, 0x0) 18:31:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x281]}, 0x2c) 18:31:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x58) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:29 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000180)={0x0, @aes256}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000100)={0xffff, 0x401, 0x4, 0xdd}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:29 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8801000000000000]}, 0x2c) 18:31:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4c46) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1470.475958] IPVS: ftp: loaded support on port[0] = 21 18:31:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:29 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 18:31:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3f00]}, 0x2c) 18:31:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:29 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0xfffffffffffffffe, 0x18000) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:29 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x8, 0x7, 0x5, 0x1, 0x100, 0x100000001, 0x8, {0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x89, 0x2, 0x8, 0x5, 0x1}}, &(0x7f0000000040)=0xb0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={r1, 0x10001, 0x80, 0xe6, 0x1f, 0x3ec}, 0x14) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0442"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1047, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa400000000000000]}, 0x2c) 18:31:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:30 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x106c) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) fcntl$setpipe(r0, 0x407, 0x59) 18:31:30 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x90000, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1a01000000000000]}, 0x2c) 18:31:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:30 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c464b5df9f3f60000000000000000000900000000000000000000000000003800000000000000000000000000060000000000ebffffffffffffff00000000010200000000000000000000000000000023ff8492957508d53ae3639cdac49f13beb86cd58003d74a3be8b4552b7f235ebbf7a703172c6ed36b5dd50d38973c702cda9b2f1eea3eda1ee6659c8f273eb7ffae31a7df82c5ad7672165de9029a75eb9f"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x2c) [ 1471.720121] IPVS: ftp: loaded support on port[0] = 21 18:31:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000080)) openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) 18:31:30 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:30 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc044565d, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0xc0000000, {}, {0x0, 0x0, 0xb5, 0x0, 0x1, 0x3ff, "bd2a5bea"}, 0x100, 0x1, @fd=0xffffffffffffffff, 0x4}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)=0x3357) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="fff2e9237d5cb215f4151d0b40671ae2807f8b1d2e88cf6c872f8296dc681704d18918d0691ff6973e0be674add8b050b2b3b8c429bc1f9fcda592f5be46a469"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x802, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000180)=""/143) 18:31:30 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socket$inet6_udp(0xa, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd4010000]}, 0x2c) 18:31:30 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x803, 0x200) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:30 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1472.320844] IPVS: ftp: loaded support on port[0] = 21 18:31:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8000000]}, 0x2c) 18:31:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x4000, 0x0) accept4$unix(r0, 0x0, &(0x7f0000000300), 0x80800) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=""/149, 0x95) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x58) execveat(r1, &(0x7f0000000440)='\x00', 0x0, 0x0, 0x1000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000100)=0x7) inotify_add_watch(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)={0x0, 0x33, "1a98228c0b8f51af7471cd6c95938ebd6a78ff8267d4bdc59e590e8875ef6d35e61e6576c5085c335dfd55763e51d7cc18960c"}, &(0x7f0000000380)=0x3b) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000003c0)={r2, 0xfffffffffffffffa, 0x1, 0x3f, 0x100000001, 0xfffffffffffffff8}, &(0x7f0000000400)=0x14) 18:31:31 executing program 0: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000380)='./file0\x00', 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000003c0), 0x106, 0x100d}}, 0x20) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000200)={{0x33, @loopback, 0x4e22, 0x0, 'lc\x00', 0x20, 0x18, 0x65}, {@broadcast, 0x4e22, 0x0, 0x8, 0xfffffffffffffffc, 0x80000001}}, 0x44) r3 = dup(r0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x5aa}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000300)={r4, 0x0, 0x30}, &(0x7f0000000340)=0xc) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f00000000c0)={'bpq0\x00', 0x101}) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getdents(r3, &(0x7f0000000140)=""/75, 0x4b) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:31 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffe, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000000)={{0x7fffffff, 0x100000000000b}}) getsockopt$sock_int(r0, 0x1, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) read$eventfd(r0, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) ioctl$int_in(r1, 0x80004040045010, &(0x7f00000001c0)=0x7) 18:31:31 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80100, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:31 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f0000000080)) ioctl$int_in(r0, 0x80004040045010, &(0x7f00000000c0)=0x7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 1473.747056] bridge0: port 1(bridge_slave_0) entered blocking state [ 1473.753559] bridge0: port 1(bridge_slave_0) entered disabled state [ 1473.760885] device bridge_slave_0 entered promiscuous mode [ 1473.792161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1473.798636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1473.805725] device bridge_slave_1 entered promiscuous mode [ 1473.835294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1473.864327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1473.961873] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1474.001375] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1474.147860] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1474.154996] team0: Port device team_slave_0 added [ 1474.194608] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1474.201924] team0: Port device team_slave_1 added [ 1474.238881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1474.271989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1474.313181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1474.352438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1474.439285] device bridge_slave_1 left promiscuous mode [ 1474.444816] bridge0: port 2(bridge_slave_1) entered disabled state [ 1474.452853] device bridge_slave_0 left promiscuous mode [ 1474.458827] bridge0: port 1(bridge_slave_0) entered disabled state [ 1474.491182] team0 (unregistering): Port device team_slave_1 removed [ 1474.503263] team0 (unregistering): Port device team_slave_0 removed [ 1474.513426] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1474.524911] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1474.556638] bond0 (unregistering): Released all slaves [ 1474.928786] bridge0: port 2(bridge_slave_1) entered blocking state [ 1474.935184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1474.941902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1474.948338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1474.955927] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1475.657846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1476.703601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1476.799873] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1476.900028] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1476.906182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1476.914027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1477.006625] 8021q: adding VLAN 0 to HW filter on device team0 18:31:36 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f05"], 0x2) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000002780)=0x4, 0x4) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000002740)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/198, 0xc6}, {&(0x7f0000000280)=""/39, 0x27}, {&(0x7f0000000380)=""/194, 0xc2}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/236, 0xec}, {&(0x7f00000015c0)=""/236, 0xec}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/64, 0x40}], 0x9, &(0x7f0000000300)=""/41, 0x29, 0x8}, 0x10000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3da]}, 0x2c) 18:31:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x1, @local, 0x10001}}, 0x4562, 0xa000000000000000}, &(0x7f0000000140)=0x88) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000240)={0x0, "a135b65b1bc20cbbad9ad20bc89b2bd447cc0e973129fc7f68c4d166f49649f0", 0x4, 0x20, 0x5, 0x4991ea66, 0x10, 0x1, 0x1, 0x7ff}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x51f, @remote, 0x3}}}, 0x84) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:36 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80, 0xd4000) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0x8001, 0x7}) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:36 executing program 0: unshare(0x6c060000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x40b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb8519e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f123a8ae0f06", 0xfffffffffffffffd) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x200000fff) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x182]}, 0x2c) [ 1477.762887] IPVS: ftp: loaded support on port[0] = 21 18:31:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f8, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80000000000005, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) 18:31:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x36e]}, 0x2c) 18:31:36 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000100)={0x158, 0xfffffffffffffffe, 0x4, [{0x0, 0xfff, 0xa, 0x80, '/dev/vhci\x00'}, {0x6, 0x7, 0x8, 0x3, '++system'}, {0x6, 0x2, 0xa, 0x9, '/dev/vhci\x00'}, {0x4, 0x7f, 0xa, 0x200, '/dev/vhci\x00'}, {0x0, 0x2, 0x0, 0x6b}, {0x4, 0x1000, 0x10, 0x400, 'B#em0wlan0nodevQ'}, {0x1, 0x1, 0xa, 0x9, '/dev/vhci\x00'}, {0x5, 0x10000, 0x1, 0x8, "eb"}, {0x4, 0x8, 0xa, 0x800, '/dev/vhci\x00'}]}, 0x158) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff, 0x1}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$int_in(r0, 0x5473, &(0x7f0000000080)=0xde) 18:31:36 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x2c) 18:31:37 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) init_module(&(0x7f0000000040)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x8a, &(0x7f0000000240)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861") inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:37 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x20008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000200)=ANY=[], 0x0) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x7ff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x100000000, 0x0, 0x8000, 0x8, 0x0, 0xc732, 0x8, 0x0, r1}, 0x20) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioprio_set$uid(0x3, r3, 0x7) 18:31:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xda03000000000000]}, 0x2c) 18:31:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:37 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000180)={0x100, "bf4a938ceaad452fd771951bab394d9f97c330b9ef060587cd51bb6867c00da9", 0x3, 0x6f, 0x0, 0x80008, 0xe}) r1 = getpgrp(0x0) recvfrom$unix(r0, &(0x7f00000002c0)=""/80, 0x50, 0x140, &(0x7f0000000340)=@abs={0x0, 0x0, 0x4e21}, 0x6e) write$cgroup_pid(r0, &(0x7f0000000100)=r1, 0x12) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x1, 0x30}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r3, 0x4) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:37 executing program 1: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffff9c, 0xc044565d, &(0x7f0000000140)={0x7, 0x9, 0x4, 0x1000000, {r0, r1/1000+30000}, {0x3, 0x1, 0x4, 0x7ff, 0xff00000000000000, 0x9, "b3e1bdb9"}, 0x8, 0x6, @fd=0xffffffffffffff9c, 0x4}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x1010, r2, 0x28) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x0, 0x600, 0xd72b}}, 0x30) ioctl$int_in(r3, 0x0, &(0x7f00000000c0)=0x401) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000080)={0x9, 0x6, 0x3}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, 0x0, 0x0) 18:31:37 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x27df02f6561f5e01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x40001, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x2f, &(0x7f0000000240)=""/190, &(0x7f0000000080)=0xbe) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000e5ffffffffffffff030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) connect$unix(r0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1478.650816] IPVS: ftp: loaded support on port[0] = 21 18:31:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2f8]}, 0x2c) 18:31:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:37 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000000000000000000000002000020000000000000000000000000000000000000000000000000000000000000000421d9bdd00ae0000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x2c) 18:31:37 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r2 = dup2(r0, r1) sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x22000001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x89}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000010}, 0xc0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd0000000]}, 0x2c) 18:31:37 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) gettid() clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000040)) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000022c0)={0x1, 0x0, 0x2080, {0x0, 0x0, 0x1}, [], "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", "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"}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x0) 18:31:37 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045011, &(0x7f0000000040)=0x7) 18:31:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfe03]}, 0x2c) 18:31:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0xc020660b, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:38 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) sync_file_range(r1, 0xf9b, 0x62, 0x4) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x7c8, 0x330, 0x0, 0xec, 0xec, 0x5f0, 0x6fc, 0x6fc, 0x6fc, 0x6fc, 0x6fc, 0x6, &(0x7f0000000140), {[{{@ipv6={@local, @loopback, [0x0, 0x0, 0x0, 0xffffff00], [0xffffffff, 0xffffffff, 0xff000000], 'ifb0\x00', 'team0\x00', {0xff}, {}, 0x33, 0x8, 0x4, 0x10}, 0x0, 0xc8, 0xec}, @inet=@TOS={0x24, 'TOS\x00', 0x0, {0x4, 0x76a3}}}, {{@uncond, 0x0, 0x200, 0x244, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x3ff, 0x0, 0x1, 0xbf8000000000000, 0x1, 0x4, [@local, @dev={0xfe, 0x80, [], 0x15}, @ipv4={[], [], @remote}, @empty, @local, @mcast2, @remote, @remote, @mcast2, @local, @remote, @mcast1, @mcast2, @mcast1, @mcast1, @mcast2], 0x7}}]}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv4=@remote, 0xd, 0x1a, 0x200}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xb}, @remote, [0x0, 0xff, 0xffffff00, 0xff], [0xffffffff, 0xff0000ff, 0xffffffff], 'ifb0\x00', 'lo\x00', {0xff}, {}, 0x3f, 0x3f, 0x2, 0x10}, 0x0, 0x178, 0x1d4, 0x0, {}, [@common=@srh1={0x8c, 'srh\x00', 0x1, {0xc, 0x200, 0x0, 0x4, 0x8, @ipv4={[], [], @multicast1}, @mcast2, @mcast1, [0x0, 0xff000000, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff, 0xff000000], [0x0, 0xff, 0xffffffff, 0xffffff00], 0x2000, 0x80}}, @common=@mh={0x24, 'mh\x00', 0x0, {0x1f, 0x6, 0x1}}]}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv6=@mcast2, [0x7b3304cb710a2a26, 0x0, 0xffffffff, 0xffffff00], 0x4e24, 0x4e20, 0x4e21, 0x4e24, 0x0, 0x3f, 0x1, 0x1e88ac0f00000, 0x9}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xc}, @dev={0xfe, 0x80, [], 0x17}, [0xffffffff, 0xffffffff, 0xff000000], [0xffffffff, 0xffffffff, 0xffffff00, 0xff000000], 'lo\x00', 'yam0\x00', {}, {}, 0xff, 0xfffffffffffffffd, 0x4, 0xa}, 0x0, 0xc8, 0xec}, @inet=@TOS={0x24, 'TOS\x00', 0x0, {0x7}}}, {{@ipv6={@empty, @loopback, [0x0, 0xffffffff, 0xff000000], [0xffffffff, 0xffffffff, 0xff000000, 0xffffffff], 'team0\x00', 'dummy0\x00', {}, {0xff}, 0xbb, 0x0, 0x4, 0x2}, 0x0, 0xc8, 0x10c}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@remote, 0x3b, 0x3, 0x1}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x824) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x8, &(0x7f0000000040)='#.[(em0\x00', 0xffffffffffffffff}, 0x30) fcntl$setownex(r1, 0xf, &(0x7f0000000100)={0x1, r2}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:38 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) userfaultfd(0x800) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c3f00000000000000000000000003000600000000b67baefc423300000000003800000000008a6744753f1fc17cb8000000000000000020000200000000000000000000000000000000000000000000005c02c084e41988613d0000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)=""/4096, 0x12000, 0x1000}, 0x18) 18:31:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1200]}, 0x2c) 18:31:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x40049409, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1479.770364] IPVS: ftp: loaded support on port[0] = 21 18:31:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f00000000c0)=0xfffffdffffff7fff) 18:31:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f0000000040)=0x0) io_destroy(r1) 18:31:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf6020000]}, 0x2c) 18:31:38 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004048045010, &(0x7f0000000100)=0xe) 18:31:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x68030000]}, 0x2c) 18:31:38 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) sched_setscheduler(r0, 0x5, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="ff80f50668031e5dcec3422e4881e8702b6848e248aade05d34d1b1ebb4e29aa85f3aa"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:39 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) mq_timedsend(r0, &(0x7f0000000200)="902b5911d146583a62983819f77ebeb448f64bf81d9de2a2253fbad3d88da8a5fd044f9b748911634f2f74524253c5aa823db890633f6e0531711b5c0795e23eaabf494ca807f742d65538cf8a57fc8aef14cc9ab76ca7aac1f246e09e925265d8bd4d0c2d7eec19d495bdc48479fa", 0x6f, 0xd25, &(0x7f0000000280)) r1 = socket$key(0xf, 0x3, 0x2) fstatfs(r1, &(0x7f00000000c0)=""/126) r2 = openat$userio(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r3 = dup3(r2, r1, 0x80000) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0086426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{}, {0x0}, {}, {}, {}]}) poll(&(0x7f0000000000)=[{r1, 0x1}, {r2, 0x400}], 0x2, 0x0) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f00000001c0)={r4, 0x30}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) syncfs(r5) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000002c0)={'mangle\x00'}, &(0x7f0000000340)=0xfffffffffffffe38) 18:31:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5450, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x80000, 0x20) r1 = inotify_add_watch(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x20) inotify_rm_watch(r0, r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xdc, r2, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xba}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0xde4acf5e2b5f9ce9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x97}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x28}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x56}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40000}, 0x90) r3 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r3, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) vmsplice(r3, &(0x7f0000000240)=[{&(0x7f0000000040)="df86d0be98b2c0b0dca190dfe00e346f55d525754edcefb7d26392a2041dfbe122c7fafa414801837a34e047f2f6b617fdefce566dab668499cb67f5a1ff1f9e8428afafc25df8968f967e437554980c996a8e72bd19652bae1fc17eb6d8bc5a8f68c5b555f8c03e60e1af6679d7e2f59af2eccd58792788195dc704df026a4a9a36febaae7d209771c2e3657fbc3c3af884d4992b0e1d159db913dde1", 0x9d}], 0x1, 0x1) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2600]}, 0x2c) 18:31:39 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x80004040045010, &(0x7f0000000040)=0x7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'yam0\x00', 0x2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0xff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x6}, &(0x7f0000000180)=0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000200)=r2) 18:31:39 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000100)={0x7, 0x3e77577f, 0x7fffffff, 0xfffffffffffffbff, 0x3, @discrete={0xb4a6}}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$inet(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) write$FUSE_WRITE(r0, &(0x7f0000000140)={0x18, 0x0, 0x4, {0x1}}, 0x18) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc]}, 0x2c) 18:31:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x400000) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0x9, 0x7fff}) r1 = memfd_create(&(0x7f0000000440)="451ffb19ff9a42d99433f83615fc6db5ae288859c9e91ee36e3d042bc5254ccbffc2ee72f220aae1fc3ed8d70103d2f17784e0be55d82e12022bb9ea81715f44b660e247bfcff990179bc662ee9fc01225e637081e2f8e9c6ce39030007179cb4e126a7506a946dbe407507c7035dca0b6d6ffc000ce646758e979558a26b5d8b84c73cd9faf5f8720580be71ccf69062747b45f6dfaa5a1cbfb26d5eacc9a259e39b49820955c31a8c056c08343c895ac223ec2e33eac80a858b275a8a38e4ca57b0b649a1f87db76e12a0d83f6e8ac714a7eee8a12e148f8f89452e257a1243cef9d3a540bfeead42a", 0x8000000000006) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1480.929477] IPVS: ftp: loaded support on port[0] = 21 18:31:39 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f0000000100)=[@clear_death], 0x0, 0x1000000, 0x0}) 18:31:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9c02000000000000]}, 0x2c) 18:31:39 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x2, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1481.159103] binder: 4029:4030 Acquire 1 refcount change on invalid ref 0 ret -22 [ 1481.197055] binder: 4029:4030 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 1481.251518] binder: 4029:4039 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 1481.316187] binder: 4029:4039 Acquire 1 refcount change on invalid ref 0 ret -22 [ 1481.363437] binder: 4029:4039 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 1481.397713] binder: 4029:4030 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 18:31:40 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00 '], 0x2) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x8, 0x4) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x2, &(0x7f0000ffe000/0x1000)=nil) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000100)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000400)="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", 0x1000) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000100)={r0, r0, 0xa4}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) migrate_pages(r3, 0x80000001, &(0x7f0000000040)=0x9, &(0x7f0000000080)) 18:31:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4000000000000]}, 0x2c) 18:31:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:40 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002500)={0xffffffffffffff9c, 0x50, &(0x7f0000002700)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002780)=r0, 0x4) r2 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r4 = dup2(r3, r3) recvmsg$kcm(r4, &(0x7f00000026c0)={&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000002640)=[{&(0x7f0000000140)=""/9, 0x9}, {&(0x7f0000000180)=""/221, 0xdd}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/235, 0xeb}, {&(0x7f0000001380)=""/154, 0x9a}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/40, 0x28}, {&(0x7f0000002480)=""/82, 0x52}, {&(0x7f0000002500)}, {&(0x7f0000002540)=""/218, 0xda}], 0xa, 0x0, 0x0, 0xec}, 0x1) io_setup(0x1000, &(0x7f00000027c0)=0x0) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000002900)={0x6, 0xf, 0x5}) io_cancel(r5, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x1f, r2, &(0x7f0000002800)="0ed002b756ce6c1c7ee23cf61c0fe13267528bcec0037dff62c891a69a4d19394e30d864b0f84b686be30dcd407e5bb5510cce0f4088f163d0bfae93aaa9cc62602374310d8bdb958574f7f3d1e14616a2a8e37aa550538cc7a36f3ca1f4ce21cc4999eda9180254237b4c18a0a4ddac606aaa72901f4cc8d490", 0x7a, 0x1, 0x0, 0x0, r1}, &(0x7f00000028c0)) getsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000002940)={@multicast2, @loopback}, &(0x7f0000002980)=0x8) 18:31:40 executing program 1: 18:31:40 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7fffffff, 0x311200) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000080)=""/14, &(0x7f00000000c0)=0xe) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)='\x00', 0x0) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000892fb2229ae97350f0173c08680053df3c3c354fbb4decb86586d1a0abbf1c63c766c92c76fdfc81f0e12813dc40e38c55b5e3d0ee6ab8c1e3645150d305f46b710ea20f9b717a2e5a039978"], 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:40 executing program 1: [ 1481.784727] IPVS: ftp: loaded support on port[0] = 21 18:31:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x2c) 18:31:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x2c, 0x0, 0x25dfdbfe}, 0x3a8}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:40 executing program 1: 18:31:40 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x2100, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x20, 0x2, 0x0, 0x1f0, 0x13, 0x3, 0x900000000}, 0x1c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x81020000]}, 0x2c) 18:31:40 executing program 1: [ 1482.827726] IPVS: ftp: loaded support on port[0] = 21 18:31:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='eth0!\x00', 0x6, 0x1) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x24, @tick=0xff, 0x4467, {0x80, 0xd2d7}, 0x8, 0x1, 0xfffffffffffffff9}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0xa4, &(0x7f0000000380)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x7, @local, 0x5}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x1a}, 0x7}, @in6={0xa, 0x4e22, 0x83, @mcast1, 0xfffffffeffffffff}, @in={0x2, 0x4e24, @local}]}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000440)={r1, @in6={{0xa, 0x4e24, 0x401, @loopback, 0x5}}}, &(0x7f0000000500)=0x84) 18:31:41 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:41 executing program 1: 18:31:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8801]}, 0x2c) 18:31:41 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0x2, {{0x2, 0x4e21, @rand_addr=0x1}}}, 0x84) write$P9_RLERRORu(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="71e5adb981124cc616d4fb780800000072b8cfb10c88978405000000000000005254b7e7e8e6f9d381a13a20dc967b381c1539c44f285a41291e751a1a7059dede721da268"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000080)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r5 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0186405, &(0x7f0000000400)={0x4, 0x3, r5, 0xe142, r6, 0x3f, 0x2, 0x7}) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x4e22, 0x3de4f0, @mcast1, 0x7}, 0x1c) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000280)={{0x1, 0x0, 0x8, 0x5}, 'syz1\x00', 0x2a}) 18:31:41 executing program 0: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:41 executing program 4: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000080)='^\x00', &(0x7f0000000240)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", &(0x7f0000000300)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", &(0x7f00000000c0)='\x00', &(0x7f00000003c0)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", &(0x7f0000000480)='\x00', &(0x7f00000004c0)='}proc\x00', &(0x7f0000000500)='-keyring\x00'], &(0x7f0000000680)=[&(0x7f0000000580)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", &(0x7f0000000640)="656d31747275737465647365637572697479707070305e766d6e65743070726f6324cc36766d6e65743100"], 0x1000) [ 1483.217832] sit0: mtu greater than device maximum 18:31:41 executing program 1: 18:31:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4601]}, 0x2c) [ 1483.276847] IPVS: ftp: loaded support on port[0] = 21 18:31:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:42 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff90"], 0x2) close(r1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @empty}, &(0x7f0000000240)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0xf}, 0x35, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x6) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000040)) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = dup2(r1, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000100)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xa6eb54d1ac11a672) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:42 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) prctl$PR_GET_TIMERSLACK(0x1e) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:42 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000e88ff8baa0c8"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x5a01000000000000]}, 0x2c) 18:31:42 executing program 1: 18:31:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3e0]}, 0x2c) [ 1484.076597] IPVS: ftp: loaded support on port[0] = 21 18:31:42 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xffffffff, 0x200243) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x9) openat$userio(0xffffffffffffff9c, 0x0, 0x40, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0x9, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180)=0x6, 0x4) 18:31:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1d4]}, 0x2c) 18:31:42 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x95ffffff) 18:31:42 executing program 1: 18:31:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f5, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:42 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0f8565c, &(0x7f0000000100)={0x5, 0x2, 0x4, {0xc, @raw_data="b08c9996ac1c37900b6e4889c8ffdca2395b26ad86a3c5829d82ba5c9108abb0416f77bb05c4fe8c5673eadddd2669167546f164952f8cbb1db2808a1bc731a50315166679246fbd0929b8f6f5f3b975cdf8307ecde86717b854829c0ca9439d9bb16da6091b9488e58d90bf0efe07b8a566c73da9f590a28b25eb5677d29f340fca07d4b22703c90f21c7f94f894862a48876c15137564d71af5fa23bf1ea11b8177c7f06fb0c0182042c7e2e0166a15ac08a470ab19e47bcd265564a882983e935ee4429a77cac"}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:42 executing program 4: socketpair$unix(0x1, 0x1000000000007, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101000, 0x0) renameat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000600)='./file0\x00') setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_team\x00', 0x10) write$binfmt_elf64(r1, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x800, 0x5, 0x400, 0x1, 0x1, 0x3, 0x3e, 0x5, 0x202, 0x40, 0x3af, 0xffffffffffffcf46, 0x7fff, 0x38, 0x2, 0x8000, 0x6c5, 0x9}, [{0x70000004, 0x7, 0x8001, 0x5718, 0x3, 0x5, 0x2, 0xb0f3}], "5de0ab9b860b4be0c5c7c4bde690c12cf7f7c3758b5e41ef967ec8b1de8d1eab7a72eb30aa0210f461f61270d9b97495f315c867c663d3cf25119fd7a76155", [[], [], []]}, 0x3b7) write$binfmt_script(r1, &(0x7f0000000640)={'#! ', './file0', [{0x20, '/dev/sequencer2\x00'}], 0xa, "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"}, 0x118) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:42 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:42 executing program 1: 18:31:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe]}, 0x2c) [ 1484.400013] IPVS: ftp: loaded support on port[0] = 21 18:31:43 executing program 1: 18:31:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x5421, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:43 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0xc0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0086401, &(0x7f0000000140)={0x1f, &(0x7f0000000100)=""/31}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb403]}, 0x2c) 18:31:43 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240)=0x26f, 0x4) write$P9_RXATTRCREATE(r0, &(0x7f00000002c0)={0x7, 0x21, 0x2}, 0x7) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/179) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:43 executing program 1: 18:31:43 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x301000, 0x0) listen(r0, 0x800) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2, r2}) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:43 executing program 1: 18:31:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1500000000000000]}, 0x2c) 18:31:43 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x1, 0xd7f7) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:43 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'s:t0\x00', @ifru_flags}) [ 1485.197453] IPVS: ftp: loaded support on port[0] = 21 18:31:43 executing program 1: 18:31:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfe03000000000000]}, 0x2c) 18:31:44 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000340)={0xfc, {0x469d, 0x5}}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001880)={0x0, 0x0}, &(0x7f00000018c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev={0xac, 0x14, 0x14, 0x16}, @in=@broadcast, 0x4e23, 0x0, 0x4e21, 0x6, 0x2, 0x0, 0x0, 0x29, r3, r4}, {0x10001, 0x20, 0x6, 0x2, 0xffffffff, 0xeb5, 0x2576000, 0xfffffffffffff590}, {0x4, 0x3, 0x81}, 0x4, 0x0, 0x2, 0x1}, {{@in6=@local, 0x4d2, 0x7f}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0x5, 0x2, 0xfffffffffffffffc, 0x6, 0xffff, 0x3}}, 0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) lchown(&(0x7f0000000140)='./file0\x00', r5, r6) setxattr$security_smack_entry(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.SMACK64IPOUT\x00', &(0x7f0000000500)='NETMAP\x00', 0x7, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000100)={0x29, 0xd, 0x14, 0x2, 0x4, 0xf39, 0x1, 0x125, 0xffffffffffffffff}) 18:31:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'s/t0\x00', @ifru_flags}) 18:31:44 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="5f0bf279c345d7309a75c5c9d36a8b662557bd539185cba46cd4c147cc0ede9d27a59b9cfc57bbdc92e26dff491ce5701bc8d15927389741e79baf6275600dd2e6def214c67dc53d9048635d15004086c4d674ac9440a4b03de040d993a6b4da93d0d37edf2875bfb77f8777eef832f236fb000065c7d2b490b4b957e3a5a7aa46ebb6e22c1e2a10420f01f2efa5520001000013a1878df72494be0fc52e0c7de01b61f186dcb3c3b9ae7fd58614f228f7268da0c904d13e833fc8cf00000000000000000000000000000000000000000000"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:44 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) fcntl$setflags(r0, 0x2, 0x1) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000008000000000000000000000000000000004f1737a8199e9099ee5d219b0f50c5f131f99ebfff6add32b3b9537220563b"], 0x28a) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e21, @empty}, {0x6, @random="2e66769d42bb"}, 0xdcff67e8bce3c706, {0x2, 0x4e21, @empty}, 'bond_slave_0\x00'}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:44 executing program 1: 18:31:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x10000000]}, 0x2c) 18:31:44 executing program 1: 18:31:44 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa4]}, 0x2c) 18:31:44 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'si:0\x00', @ifru_flags}) 18:31:44 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x0) [ 1486.068939] IPVS: ftp: loaded support on port[0] = 21 18:31:44 executing program 1: 18:31:45 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xb, 0xb, 0x4, "089d7decc9a242f4e661e243258cb78792925a5abec4a607bc148f442046ee107b76b4f391ce6e987418816186a4b8f432d5d63bf46b0bf6da73e8ebc987ca40", "2449d3453c563f337b79a51df5fa410f7c67dd8a7669365584fd8a8019d4c725", [0x1, 0xac7]}) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0xff, 0x40040) r1 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000200)={0x0, 0x8, [], @bt={0x7fff, 0x4, 0x34a3, 0x4bf6, 0x400, 0x0, 0x7, 0x8}}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000100)=0x40) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x400, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000140)={0x6, "c774707ba629d7c4660d129366e1efc75d3e56dbfe9fcb4015cc432e16b09ae8", 0x0, 0x551, 0xfffffffffffffeff, 0x4, 0x2}) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:45 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3e8]}, 0x2c) 18:31:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'si/0\x00', @ifru_flags}) 18:31:45 executing program 1: 18:31:45 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="f780"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x24a]}, 0x2c) 18:31:45 executing program 1: 18:31:45 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit/\x00', @ifru_flags}) [ 1486.804734] IPVS: ftp: loaded support on port[0] = 21 18:31:45 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x20, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", r0}, 0x10) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x18]}, 0x2c) 18:31:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) socket(0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x400, 0x6f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"7465616d30001000", 0xffffffffffbfdffc}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xce7, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xb678, 0x0, 0x4, 0xffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe827, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={"7465616d300000ffffffc00000100007", 0x4bfd}) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x68, 0x0, &(0x7f0000000700)="dc1879850eb22ff1b380a25adffa34c07bc7bce09ae9da31e0a10239f2ff297a21dc6949060445ecdc780676e05ca99b5f42f762d072def7dca5b6a46aef14b9170a76a9e29b9ab197fb37c9c91fbb550a9f328c14f3bd4e318eb9fea1a692c72897ad3adfd88f18", 0x0}, 0x28) [ 1487.257598] device team0 entered promiscuous mode [ 1487.264107] device team_slave_0 entered promiscuous mode [ 1487.277627] device team_slave_1 entered promiscuous mode [ 1487.583911] IPVS: ftp: loaded support on port[0] = 21 [ 1487.614680] 8021q: adding VLAN 0 to HW filter on device team0 18:31:46 executing program 0: unshare(0x8000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:46 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff06"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1487.903971] 8021q: adding VLAN 0 to HW filter on device team0 18:31:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfa01000000000000]}, 0x2c) 18:31:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x4) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX=r0, @ANYRES32=r0, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES64=r0, @ANYRESDEC=r0], @ANYBLOB="77a58bdca4bc119d219311421fceadecfb35fc3e9d8bfeb95a3bc8b4e2480f802e4baa1b1a20057fc8c8e89698bcffb27d48c41a3a6c1dd7a2cbf97c52dd07609ee79dd5521f17043afba9d831588c4b0e7bde699c0acf7b572c616c3c2dd10fce34061dcd959f14e6eafee0f9b0f1cc0d98f6eb0e58318917", @ANYRESOCT=r0, @ANYBLOB="00aaa79fb61bf8baf86924a97de57bd3065bb73a2413ec42ef7c35131a207f89126ce427afc896a58bbf0315a01e75c96ac6b737a8c1a9905f36f8c1b042e76d4fa9438e", @ANYPTR64], 0xd0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit:\x00', @ifru_flags}) 18:31:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) socket(0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x400, 0x6f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"7465616d30001000", 0xffffffffffbfdffc}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xce7, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xb678, 0x0, 0x4, 0xffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe827, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={"7465616d300000ffffffc00000100007", 0x4bfd}) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x68, 0x0, &(0x7f0000000700)="dc1879850eb22ff1b380a25adffa34c07bc7bce09ae9da31e0a10239f2ff297a21dc6949060445ecdc780676e05ca99b5f42f762d072def7dca5b6a46aef14b9170a76a9e29b9ab197fb37c9c91fbb550a9f328c14f3bd4e318eb9fea1a692c72897ad3adfd88f18", 0x0}, 0x28) 18:31:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x29c]}, 0x2c) 18:31:46 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000fffe00", @ifru_flags}) 18:31:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x7ffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40046432, &(0x7f0000000040)=0x6d90) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:46 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2eeded810d64281473af8167c5497f92608059f7d5782ccb0523f11dc86bdd70f49eb09faeef2b55065e5ab56e43017b7295ea2518a1294850b1153f72127c25c46060b765b6e472a5b4f0f06714b4cdfde538f0483f12bdf144d1c23dbc9d8ff0d0cf33e13ca5e19b0dca6b20323c4f5d0f61004d8e5656c11d3fa8151e608f2ee9a2013715070f6981d50d36cac07920065cb1e8a595abbb6d297e4825160a718b803adbf2e99c4648ca37"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040)={0x5}, 0x1) 18:31:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9a020000]}, 0x2c) 18:31:46 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) clone(0x8002102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() fchownat(r0, &(0x7f0000000080)='./file0\x00', r1, r2, 0x1100) getsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1489.065432] 8021q: adding VLAN 0 to HW filter on device team0 18:31:47 executing program 2: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000000)={"62726964676530000000008000", 0x0}) sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0246400, &(0x7f0000000080)={0x81, 0x4, 0x2, 0xe6, &(0x7f0000000100)=""/230, 0x9a, &(0x7f0000000200)=""/154, 0x20, &(0x7f0000000040)=""/32}) 18:31:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x15000000]}, 0x2c) 18:31:47 executing program 4: socketpair$unix(0x1, 0x8007, 0x0, 0x0) clone(0x800000040000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x20000001000) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000004c0)={@loopback, @broadcast, 0x0}, &(0x7f0000000500)=0xc) sendto(r0, &(0x7f00000003c0)="7942abc624eecabf236e5b875db343d31d31ca566eea7443af8c5bc913010bb7820269ca014f80036518c1d4a75d7edc6c18877e3789b0e48e5f1f207cba73c12b5351a40c0139f85196ccaea69eb53fb7721b6c509364b6", 0x58, 0x45, &(0x7f0000000540)=@can={0x1d, r1}, 0x80) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @local}, &(0x7f0000000080)=0xc) sendto(r0, &(0x7f0000000240)="bcdad3eda0ecde0486803bab847b6172fa678fe25471542448f626c6ea697e4c2b662db456cdf55c053326666ea80a15ef2898b014f2b4a3f1f7f0d285fb2b2b64366462eb649005a6a8d10d8c76c52c7f144061490b260a2744a8608e105147b456f496b33dbe220359ffa1a400a00da7ca305e419254ab08a0cc220efd62f7f4958f0e60f54be47ffa0734a63a359f8dcdd443f27c1168cb41bd52235ad66e50cb55f9fd8056d5116dad621be0129bbfe449805a2664df908ee800cdcf2f1e00d4b73f8ee03048095c29e6e56ac7133cf74107eeab2721b32a6abe955693de13080dc61d2d2861d200", 0xea, 0x4004801, &(0x7f0000000340)=@xdp={0x2c, 0x5, r2, 0x4}, 0x80) inotify_add_watch(r0, 0x0, 0x0) 18:31:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) socket(0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x400, 0x6f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"7465616d30001000", 0xffffffffffbfdffc}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xce7, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xb678, 0x0, 0x4, 0xffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe827, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={"7465616d300000ffffffc00000100007", 0x4bfd}) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x68, 0x0, &(0x7f0000000700)="dc1879850eb22ff1b380a25adffa34c07bc7bce09ae9da31e0a10239f2ff297a21dc6949060445ecdc780676e05ca99b5f42f762d072def7dca5b6a46aef14b9170a76a9e29b9ab197fb37c9c91fbb550a9f328c14f3bd4e318eb9fea1a692c72897ad3adfd88f18", 0x0}, 0x28) 18:31:47 executing program 0: unshare(0x40004) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0xa0000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x610000, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) write$P9_RWALK(r0, &(0x7f0000000440)={0x64, 0x6f, 0x1, {0x7, [{0x48, 0x1, 0x2}, {0x10, 0x0, 0x6}, {0x80, 0x1, 0x8}, {0x20, 0x3}, {0x0, 0x1, 0x7}, {0x0, 0x1, 0x1}, {0x40, 0x0, 0x6}]}}, 0x64) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0xdd, "fe4bcbabea0bd3e71f6b4143d5655a6d3a4e457ad3f40c87c46c3c761d7d08204ba7425755ba7ab5403280608ef01920cfacfdee93b0d24f4a7ee4f83ea5b51d632bef4fc452e1844c2d8e9aac73e667bb80727d3ec9a07c0d15d5606247af4d909d81e0c5aa113783177e34726af5a3e449fa7cd434a401525c9ea734a24746879ed237d1a07628316ecba0dcbb43de8bb60d890fea0908ccfb40a9db2d5c926b0bf3552244e993bac69e726a19721c1acdc54082d3dc896add9d9d860f141b3ac42374b4e315118ffbe5e900d723812d8a7ccc0414f007df38ac71ff"}, &(0x7f0000000280)=0xe5) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000004c0)=[@in6={0xa, 0x4e21, 0x10001, @loopback, 0x6}, @in6={0xa, 0x4e21, 0x1, @remote, 0x8}, @in={0x2, 0x4e23, @empty}], 0x48) write$UHID_CREATE2(r1, &(0x7f0000000300)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x13, 0x3, 0xfffffffffffffffa, 0x6, 0x1, 0xa88, "24dd2bb4e53995e701c08a6eb5c98bdcafbf54"}, 0x12b) getsockname$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000005c0)=r4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0x1, 0x800d, 0x100, 0x1, 0x9, 0x7, 0x7, r3}, 0x20) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+'}, 0x28, 0x2) 18:31:47 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0dirb\x00', @ifru_flags}) 18:31:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd4030000]}, 0x2c) [ 1489.298474] IPVS: ftp: loaded support on port[0] = 21 18:31:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6a03]}, 0x2c) 18:31:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x11a]}, 0x2c) 18:31:48 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, 0x0, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x36a]}, 0x2c) 18:31:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2a03]}, 0x2c) 18:31:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa00]}, 0x2c) 18:31:48 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff98"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000040)={0x2, 0x1, [{0x1, 0x0, 0x101}, {0x9, 0x0, 0x100}]}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1490.390405] 8021q: adding VLAN 0 to HW filter on device team0 18:31:50 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000000000000000000000002000020000000000000000000000000000000800000000000000000000000000000000000000000000000000000053ef42d69bf0317618a34a014ce783feda6a913eb0fff552ce7638bf2110d9ae587ea29efc848acdd8c669273bb8c8cbd4ef0e3c07f47a980a33905f04032d773efa52b1a5e3a99b691cca558fdfa7ebe7091c6641ccb0070957d0aa7a0726e9c594aedfbf675091ddf9b5436dc96c3d51b13fcdd65230d598671e379e4126bca820538987a5d93ed95cde085bf6"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:50 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x64001, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf00]}, 0x2c) 18:31:50 executing program 0: unshare(0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) socket(0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x400, 0x6f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"7465616d30001000", 0xffffffffffbfdffc}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xce7, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xb678, 0x0, 0x4, 0xffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe827, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={"7465616d300000ffffffc00000100007", 0x4bfd}) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x68, 0x0, &(0x7f0000000700)="dc1879850eb22ff1b380a25adffa34c07bc7bce09ae9da31e0a10239f2ff297a21dc6949060445ecdc780676e05ca99b5f42f762d072def7dca5b6a46aef14b9170a76a9e29b9ab197fb37c9c91fbb550a9f328c14f3bd4e318eb9fea1a692c72897ad3adfd88f18", 0x0}, 0x28) 18:31:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430fffe00", @ifru_flags}) 18:31:50 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00dirb\x00', @ifru_flags}) 18:31:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc603]}, 0x2c) 18:31:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x5, 0x6, 0x4a4, 0x3, 0x4, 0x80000001, 0x5, 0x4, 0x2, 0x7, 0x8, 0x7, 0xff, 0xffffffff80000001, 0x2], 0x5001, 0x10000}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x20800, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r3}}, {@appraise_type='appraise_type=imasig'}]}}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa403]}, 0x2c) 18:31:50 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[], 0xffffffffffffffba) clone(0x100, &(0x7f0000000040)="0412d3a8b476fa89a038c21b7df2ce77923a784f7a820d4b439d23725da87cca3439b36be52b48d69d098f7f3ac511e9e45fe5eb57cb10160cc4962e5361e3e39a2d5631900bab5528dd87a9494d00fe466e21c867996bed261308572af4e0159b5c71e3ecdc7fbc3f771d97e20556a23d6f22b162f8e6baaf1d56f66368e30202e6abf3e21b4b013d0f828eb4ea9da319", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="3a52a7d2b5058dc0bbe70ec6bb38b0248b4df35e15835ed9fdba83a618dceec6c4299343de16febc933efba6b69a2f9039611e79402734395a3fa5f3a07281353698fee2791dbceb50db3e2f62a966d6b4abd9b0d2f6ec") close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:50 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0cc5605, &(0x7f0000000240)={0x7, @raw_data="7b92a8999dadeaeaad1aadcd4cbe4fc77c4ba6ec1a47eb82d2a62c9953f5c161b84673dd4944e1fc2f8e97cd406a1f34fe8fb4ba5a2c8299ec148051603515329e2df367b37572e20813af2e4e02e80c3ae6d445a2f38b16fce3096f1a116bfbfbc183f7d98415760c8cb05982b472e47a02080144e775ae3450800f70a1a9a13516ae76b0f3b95dc0fd2c5e4d8c8c123e55a9f92c0bc31e8e6fac13d25f588a49b22e131d2504813d8a148066a648a1b266ecd5d37a22118d23fd1766f658fe3f5059638a1447b3"}) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000000000225f0fc6ec00000000000003000600000000fd0000000038000000000000000000000000002000020000000000000000000000000000000000000000000000000000000000000000000000000002e400000000"], 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1300]}, 0x2c) 18:31:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x22c]}, 0x2c) 18:31:51 executing program 2: sched_setscheduler(0x0, 0x5, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x48) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100)=0x9, 0x4) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1493.068826] 8021q: adding VLAN 0 to HW filter on device team0 18:31:51 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000458000/0x1000)=nil, 0x1000}, 0x2}) 18:31:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xdc03000000000000]}, 0x2c) 18:31:51 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="a5f8994bc773557d1a165d432076807719403d"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:51 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00\x00\x00\x00@\x00', @ifru_flags}) 18:31:51 executing program 1: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) accept4(r1, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 18:31:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x2c) [ 1493.326963] IPVS: ftp: loaded support on port[0] = 21 18:31:52 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {r1, 0xdf, 0x0, 0x0, 0x0, @ib={0x1b, 0x7, 0x10001, {"d26fc5db8969fdc7f5efd63dc6c01e36"}, 0xb502, 0xffffffff, 0x1}, @ib={0x1b, 0x7, 0x10001, {"6bf3f608fdbcf604ed243097482e58d3"}, 0x1, 0x1, 0x2}}}, 0x118) r2 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="7f456446000000000000000000000000030006000000000000000082af03f342253a5938739c57bb48d4370038000000000000000000cd57a27400004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x0, 0x5, 0x2, 0x3ff, 0x0, 0x2, 0x148, 0x2, 0x85, 0x200, 0x400, 0x3, 0x0, 0x7, 0x40, 0x7, 0x1, 0x3ff, 0x3, 0x71dd8255, 0xca, 0x106, 0x1, 0x7, 0xffff, 0x30, 0x40a, 0x7, 0x3ff, 0x7, 0x4, 0x3f, 0xf02, 0x0, 0x7, 0x7, 0x0, 0x5, 0x6, @perf_config_ext={0x0, 0x3}, 0x8, 0x8, 0x6, 0x4, 0x8, 0x0, 0x8}, r4, 0x6, r0, 0x1) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) mq_open(&(0x7f0000000540)='/dev/rtc0\x00', 0x40, 0x20, &(0x7f0000000580)={0x3, 0x0, 0x0, 0x669, 0x0, 0xdb1e1b3, 0x200, 0x2}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) 18:31:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000000000400", @ifru_flags}) 18:31:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x1200}, 0x28) 18:31:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x90020000]}, 0x2c) 18:31:52 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:52 executing program 0: unshare(0x100040000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000200", @ifru_flags}) 18:31:52 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x10000) 18:31:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xca02]}, 0x2c) 18:31:52 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc000, 0x0) r2 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) tkill(r1, 0x6) ptrace(0x10, r1) 18:31:52 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x200, 0x0, 0x7, 0x3}}, 0x20) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2a6]}, 0x2c) 18:31:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000300", @ifru_flags}) 18:31:52 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000004c0)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x10000000004) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) write$UHID_DESTROY(r1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000001c0)=0x7fff, 0x4) recvmmsg(r0, &(0x7f00000069c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1494.323416] IPVS: ftp: loaded support on port[0] = 21 [ 1494.350553] ptrace attach of ""[4594] was attempted by ""[4600] 18:31:53 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000002240)={0x3, &(0x7f0000002200)=[{0x8, 0x0, 0x87, 0x1}, {0x7, 0x1f, 0x3ff, 0x100}, {0x8, 0xfd3, 0x6, 0xa1}]}) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) r1 = getpgid(0x0) r2 = getpgrp(0xffffffffffffffff) tgkill(r1, r2, 0x40) sendmmsg(r0, &(0x7f0000002140)=[{{&(0x7f0000000040)=@ethernet={0x6}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000100)="a58f514c90e24386cd731e50d1c9da42ce20ec3b05e1f61f72ae848b7b27a1d1f59d0359179e2db337d6f37199529f2b9e23dee262075a8675584ffcdc761de542189b575c20d10cfe43ee15e2226e737e3ced93f30d34236c115fa51722c3cbc9469e884d158722f51b53048e804ffdbb9530651e97b5535977879288fab1dcc63242bcac684d23a110c44f034f6fd3188b11516d97824b4b7937436a902af7961d3225e52d0c8a2920f0589eb883bbdab59f3f804a7e394856f6b41b8bc50715de52de915ebd295059d574cb", 0xcd}, {&(0x7f0000000200)="3e45b2213b4c279ee163b6fe33be4f5bea3eb08e294277a13f5f2ec29a93fc5f8f3715e86ff87adaa7d166056103eb", 0x2f}, {&(0x7f0000000240)="5e700cce72f939501f3d8dab3f883239599ca94f80bb21b5d0a6f779d92d9746441e61552536f2e71ebce68369a25b0c2ba74d208295cf344e0f44f9f9848b0bdb9b60175fa1f6125182db379b7700", 0x4f}, {&(0x7f0000000380)="21c53059da73d7898c7b8ab9aa0e681eb71c92b9c65852d00bd69c10164b4d1862626e81101d058c4f5cfbd288f7ea3fa558e4f7e8f664fdd99f7ca1af11d5e573f3a9279b3079640e17f570a31204baf13d28cee1e08723c13b7135433d222ecb20623059a162594fc30afdb3730166b2d5c79950a599162b9b02de47520796d02f3fdde01ac1cc5d5045afda8d052bb69a7f5c1fdeb1d10309f5", 0x9b}, {&(0x7f00000002c0)="7828b3a9063f0d00be802328e47d4420f9119ff5c7714a13c3ab413386f5db44cb8557cd55631d34b7d898ac06b3e8d020cab9bb13acf378833bf359599aa5780c5bae9d29c84fc317119b59689a6baa4c4c90203f65b88070c2d2cdf3cef825dab1d11ef2ec22c0eff0aa5c05400651433a7e65", 0x74}, {&(0x7f00000004c0)="f8c3a85366bd59d9964a6d00ad3b04684be4cef7aca891ae1aa464b69016a557048e9fdfef8799f667d94d4700df5a4f37f24174f785bfba4b68320545ffa86b89455b867d8a74ad91a5f8c8256194df41869f4685063b7ce1c66f445342574baca6f0da9fc0c592e4d91ffe67282110d7382111dd78c9108a0fb4ff1e52e0eea46ac41bcc245d3aecdf72c239e5cbd657221c612d008c5b629a5d56c0332f60fd585c39a6e3be32e460795c1e2f0fc741c8df36063a9bd32d235de314f7a5bdf3a983f3e9dc45f99bf25c17", 0xcc}, {&(0x7f00000005c0)="10aa76b7fa43b543d85606359e263e68277d85b1a497b9f7d18092bc450afae7371e85d1c5bd716c1e5695e77f44182c3c41fd7d9ce9e5377a5feeed8aff206cb39d9ebb212c94559f1eb5abc225e42eec8608ca51614f039dd9c1f2853925e6daa614d398d87313a5d2023964a7a1d56da1bace790f6f85b664e78af7369ed91b4213d1d61137358215b05d155adf28ed31119176e2951d86c9f928d2b3d453755139f54dd67149bc7d237e77e35f111775d511c18d7e28dae66f83a7a845ee10670879dc113dc8703fa6d1b0eb07c7ab5d7be357d26243c97e91667db8f08dd1c357a81f43a39732334b134f23b77fb56058f3", 0xf4}], 0x7, &(0x7f00000006c0)=[{0x48, 0x11d, 0x7fffffff, "99b7d2fec6a8f6973e7ad3c27b79c0f081e5b7507fb9dea4654c68e5fea8da8814fe17cb9232b20c7b45fbfbc9c7044bb34cb0e9dcedb5d4a8"}, {0xa8, 0x1, 0x100, "2aa7a89eab14e437d892157bc73acdac796449ebee33f10397a324b9fbbaaee9265112c49fde664a69e6a08ba76b388083d4585793c4955d92652a7f5075d7f99f65f043346bd2dfeb6638946a11cccd83b00b515f4873d2ff093e1e7343372a2eb0b9e8592c5704f019e4d56f68b096cb6b7f563eae4909b64909464c3873431875c8a751b17856c38ff66785eb5916376ff71180e70831fcc168"}], 0xf0, 0x20000000}, 0x10000}, {{&(0x7f00000007c0)=@ethernet={0x6}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000840)="7845c756ed8269d0f302f50cfd90c312df03e17b2a42dcd3f897d3a3b27088e2dc6214d2f5dedca7c07cdd4852aed57912d3c649c142374ebe4747e27845ee50e11c4387c3da00ce3fe7867ad446bf01ac7a65290a780d8005e89569faf741890392bcbe5beed3d6cabe9f90d3e1178a875315b177b53c3bddb1cd", 0x7b}], 0x1, 0x0, 0x0, 0x8840}, 0x1ff}, {{&(0x7f0000000900)=@pptp={0x18, 0x2, {0x1, @loopback}}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000980)="c5e6296511b0e808719a0d92cde90a2f817845d6ef7f4cce7c9c516a8d22101df91db3eadece33d36bd789f157e8153ab3cf2f12212cab5004d8305878cc029d5bcd10ab67806cf38b2899a02d9d08010a734dcad6396d1919c372a3fd7b94a81fb8c08a8e13858d736c0107b929c6b39f8aca2dda895c3c2bff43f74f1bdddc7c80386c58cd134984a31fed10c007134a832174eaa30e724dd936af0904465bdab82c8e69a0a48aa169617af255797b2d8b94120860d2a4dfb75539b3c1d5623fc7d3e2f4833ae4e9104c4619bcbb942fa3edd8c7", 0xd5}, {&(0x7f0000000a80)="39d5aec358af76f0108dbfbcf0d4bcfbaf1f8fc54fdbc998cd725877d852a7d2c6b3217b575fa8ae9ebb1dd7c2a6e4c5202a03d2ebdebf66ff6d8fc71025951fe104af885a08b7b6a8e6c231c423714f6620c10b6648d0fa434b2f788abc357e3c52771499c32196be882787a5e5c208e26902afa8eea3fc3cc1bd53dfd3", 0x7e}, {&(0x7f0000000b00)="f1602e0b3e69d584ba7f9e291ead40192202911641b3bfd7d071a9e3bb6b897e8c50d67721da5c7e0a09216b89d266f375088a43878f20f4f149dfbd0945690c139a8673fb1a1e4bb97b32f4d2ac406e0e4194bde829d649b072ec9ea6da1c3ed3b0428428d185ce77060c57d0b7bf264987483ca9ced2f202dab2e5d6ff6527c5e445dded606d04b886c93bdc505b5d167c6f3f35f8c89fe507d290b61e7d3de66e4d0c97be41debbc339941bd96badc6826062deda7cf55ebdca5127cfef3d2daa09ba8148ba5d41f6925acde3f10db4db7a46f9998a97c0704a85dad4", 0xde}, {&(0x7f0000000c00)="5b9fbc338310a1aea83c2562b9219a6bf6890c5e85effec0a2970b76eb55e211b7136673c469e36626cf04c7dbc5e6ec842e17156eeb4eca916e1d76ed29dd6b8d8fb3265eacdc8bbb5078178ed761087ea8bf8d5c8e2bae1c2a4d16d9d63e24cd81574624eaee049cb0602afcd091a6b4c8237cfd24929883526c62ebc604e1b13f105291488e0a3b010024334e883fda6a6b4adc701098a5e195b30de3bf6a40d6", 0xa2}, {&(0x7f0000000cc0)="4a532a6f3280f91f830846b2f406e500aaf1252c716d494e9d3593c586738591d281cb7371723440bfe79f6160a38612eccc72cdcb9a66bfb9220200362237401944c941b24e8c0bb8008a73c4c57515775e4b1abe10c04b1cc6bc773329bdeaa918577c601e41d583079467aa7a85cc5083f925808fcc357fd5bce64ee9b50d24ab1b9864", 0x85}, {&(0x7f0000000d80)="0b80e5e3a3f226dac4d6732e37f49ae7bdc99674de36cfcc17d110fb56928ec5544a9e76f3d88421a1f70c04450cad95ca29d81c176be0231a1653", 0x3b}, {&(0x7f0000000dc0)="0f1fbc4041d4766ffa4261abac587c83", 0x10}, {&(0x7f0000000e00)="c1f2d4bf078d5281df1136ad701aa205e90672c880c311681800b31ebc6caeb2dbd916528b46a65b7a19ba106a681a0158c8f5845ef23a7a3c9c0a2d3bc5632c97a3cd26f021034c636d582143198abcac7628836f9c5bdb83f3b712174d507f9298e1e589740be063d37f259c5126e602a94a3cdff00a331c1e7b26884df1337de4d051b125e31a30e415559a601ca832432cb7692286898e1f2a0c163cbf136a76e2744139c7aa0c4633ba9c6938e246571d482dc332038369e5e98c0cdf79392aef9d243ae03705cd058804d78bf572a510bbd8cf5964d7415a", 0xdb}], 0x8, &(0x7f0000002280)=ANY=[@ANYBLOB="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"], 0x11c8, 0x10}, 0x9}], 0x3, 0x20000080) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000021c0)=0x9) bind$netlink(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000f40)='memory.events\x00', 0x0, 0x0) [ 1494.607476] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1494.631505] audit: type=1326 audit(1544034713.273:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4622 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7ffda29 code=0x0 18:31:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00@\x00', @ifru_flags}) 18:31:54 executing program 0: unshare(0x6c060000) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x400) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x3, {{0xa, 0x4e21, 0x551, @mcast1, 0x8}}}, 0x84) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa]}, 0x2c) 18:31:54 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00'], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/181, 0xb5) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:54 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x200, 0x0, 0x7, 0x3}}, 0x20) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430feff00", @ifru_flags}) 18:31:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd0]}, 0x2c) 18:31:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000000000200", @ifru_flags}) [ 1495.572318] IPVS: ftp: loaded support on port[0] = 21 18:31:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'yam0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000540)={@rand_addr, @broadcast, 0x0}, &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000017c0)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000019c0)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000001c00)={@empty, @loopback, 0x0}, &(0x7f0000001c40)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001c80)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001cc0)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000001dc0)=0xe8) getpeername$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14) getpeername$packet(r0, &(0x7f0000002400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002440)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002900)=0xe8) getsockname$packet(r0, &(0x7f0000002940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002980)=0x14) recvmsg$kcm(r0, &(0x7f0000003fc0)={&(0x7f00000029c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002a40)=""/173, 0xad}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/108, 0x6c}, {&(0x7f0000003b80)=""/148, 0x94}, {&(0x7f0000003c40)}, {&(0x7f0000003c80)=""/6, 0x6}, {&(0x7f0000003cc0)=""/19, 0x13}, {&(0x7f0000003d00)=""/42, 0x2a}, {&(0x7f0000003d40)=""/151, 0x97}, {&(0x7f0000003e00)=""/118, 0x76}], 0xa, &(0x7f0000003f00)=""/191, 0xbf, 0x2}, 0x140) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004000)={0x0, @rand_addr, @remote}, &(0x7f0000004040)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004080)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000004180)=0xe8) recvmmsg(r0, &(0x7f000000aa80)=[{{&(0x7f00000041c0)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004240)=""/153, 0x99}], 0x1, &(0x7f0000004340)=""/97, 0x61, 0xffffffffffffff8e}, 0x3ff}, {{&(0x7f00000043c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004480)=[{&(0x7f0000004440)=""/15, 0xf}], 0x1, &(0x7f00000044c0)=""/55, 0x37, 0x3}, 0x9}, {{&(0x7f0000004500)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000006800)=[{&(0x7f0000004580)=""/17, 0x11}, {&(0x7f00000045c0)=""/4096, 0x1000}, {&(0x7f00000055c0)=""/143, 0x8f}, {&(0x7f0000005680)=""/199, 0xc7}, {&(0x7f0000005780)=""/74, 0x4a}, {&(0x7f0000005800)=""/4096, 0x1000}], 0x6, &(0x7f0000006840)=""/93, 0x5d, 0x6}, 0x5}, {{&(0x7f00000068c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000007d80)=[{&(0x7f0000006940)=""/204, 0xcc}, {&(0x7f0000006a40)=""/58, 0x3a}, {&(0x7f0000006a80)=""/246, 0xf6}, {&(0x7f0000006b80)=""/123, 0x7b}, {&(0x7f0000006c00)=""/85, 0x55}, {&(0x7f0000006c80)=""/249, 0xf9}, {&(0x7f0000006d80)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0x80000001}, 0x9}, {{&(0x7f0000007dc0), 0x80, &(0x7f0000007f40)=[{&(0x7f0000007e40)=""/248, 0xf8}], 0x1, &(0x7f0000007f80)=""/214, 0xd6, 0x100000001}, 0x1}, {{0x0, 0x0, &(0x7f0000008080), 0x0, &(0x7f00000080c0)=""/133, 0x85, 0x3}, 0x8}, {{&(0x7f0000008180)=@ipx, 0x80, &(0x7f0000009540)=[{&(0x7f0000008200)=""/4096, 0x1000}, {&(0x7f0000009200)=""/92, 0x5c}, {&(0x7f0000009280)=""/189, 0xbd}, {&(0x7f0000009340)=""/216, 0xd8}, {&(0x7f0000009440)}, {&(0x7f0000009480)=""/179, 0xb3}], 0x6, 0x0, 0x0, 0x3}, 0x81}, {{&(0x7f0000009580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009840)=[{&(0x7f0000009600)=""/225, 0xe1}, {&(0x7f0000009700)=""/229, 0xe5}, {&(0x7f0000009800)=""/56, 0x38}], 0x3, 0x0, 0x0, 0x7}, 0x2}, {{0x0, 0x0, &(0x7f0000009a40)=[{&(0x7f0000009880)=""/246, 0xf6}, {&(0x7f0000009980)=""/132, 0x84}], 0x2, &(0x7f0000009a80)=""/4096, 0x1000, 0x5}, 0x1}], 0x9, 0x100, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000abc0)={'ip6tnl0\x00', 0x0}) getsockname$packet(r0, &(0x7f000000ac00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000ac40)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000acc0)={'bond0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000ad00)={0x0, @remote, @broadcast}, &(0x7f000000ad40)=0xc) getsockname$packet(r0, &(0x7f000000ad80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000adc0)=0x14) getpeername$packet(r0, &(0x7f000000ae00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ae40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000b700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f000000b6c0)={&(0x7f000000ae80)={0x810, r1, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xac, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5b6}}}]}}, {{0x8, 0x1, r4}, {0xec, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xa0e0}}}]}}, {{0x8}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r7}, {0xc0, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xca}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r10}, {0x16c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x68}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r14}, {0xcc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r16}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r17}, {0x7c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfed}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x90a4}}}]}}, {{0x8, 0x1, r18}, {0x1f0, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r19}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r20}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2a}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}]}, 0x810}, 0x1, 0x0, 0x0, 0x4000}, 0x40) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x821) 18:31:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9c020000]}, 0x2c) 18:31:54 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x517, 0x4) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000300", @ifru_flags}) 18:31:55 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)='securityvboxnet1\x00'}, 0x30) r3 = epoll_create1(0x80000) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000140)={r3, r1, 0x101}) 18:31:55 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186fdd82888abdfa4bf14f75189a17783ee64760935a5fb4aa2319e3ead108ecf83fd4f774d9e18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:55 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x200, 0x0, 0x7, 0x3}}, 0x20) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa400]}, 0x2c) 18:31:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000100", @ifru_flags}) 18:31:55 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind(r1, &(0x7f0000000040)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}, 0x4}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xbc00000000000000]}, 0x2c) 18:31:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300400", @ifru_flags}) 18:31:55 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) llistxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/21, 0xffffffffffffff26) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000002c0)={0x0, 0x0, {0x1e, 0x3, 0x2, 0x3, 0x4, 0x6, 0x2, 0x4f}}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80041270, &(0x7f0000000340)) accept4$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80000) umount2(&(0x7f0000000300)='./file0\x00', 0x4) [ 1496.546259] IPVS: ftp: loaded support on port[0] = 21 18:31:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c460000000b0000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf802]}, 0x2c) 18:31:55 executing program 4: socketpair$unix(0x1, 0x1000005, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0xffc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) 18:31:56 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000140)=""/186) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8000, 0x0) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80000000) inotify_rm_watch(r1, r2) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:31:56 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x200, 0x0, 0x7, 0x3}}, 0x20) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300200", @ifru_flags}) 18:31:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe803]}, 0x2c) 18:31:56 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x517, 0x4) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x1ff}}, 0x18) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:56 executing program 1: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000458000/0x1000)=nil, 0x1000}, 0x2}) 18:31:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000000fffe00", @ifru_flags}) [ 1497.505921] IPVS: ftp: loaded support on port[0] = 21 18:31:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2f6]}, 0x2c) 18:31:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x121002, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000300)={0x10001, 0x1, 0x9}) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4c4600000098b6beab96871e0000000000000000000300060000000000000000003800000000002955e45a00000000200002000000000045f200000000000000000000000000000000000000000000000000000000000000"], 0x58) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000040)=0x5, 0x8) getsockname(r1, &(0x7f0000000080)=@generic, &(0x7f0000000240)=0x80) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1497.535562] IPVS: ftp: loaded support on port[0] = 21 18:31:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x2a0]}, 0x2c) 18:31:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00@\x00', @ifru_flags}) 18:31:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:57 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x517, 0x4) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x214]}, 0x2c) 18:31:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/155, 0x9b}, {&(0x7f0000000380)=""/251, 0xfb}, {&(0x7f0000000480)=""/107, 0x6b}], 0x3, &(0x7f0000000500)=""/230, 0xe6, 0x2fce}, 0x40002000) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xffe) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000040)) inotify_add_watch(r1, 0x0, 0x20000000000) 18:31:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000000000300", @ifru_flags}) 18:31:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00\x00\x00\x00@\x00', @ifru_flags}) 18:31:57 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x517, 0x4) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf602000000000000]}, 0x2c) 18:31:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x95ffffff) 18:31:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000080)=0x1) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) 18:31:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000400", @ifru_flags}) 18:31:57 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) io_setup(0x1, &(0x7f00000004c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0x2, {{0x2, 0x4e21, @rand_addr=0x1}}}, 0x84) write$P9_RLERRORu(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="71e5adb981124cc616d4fb780800000072b8cfb10c88978405000000000000005254b7e7e8e6f9d381a13a20dc967b381c1539c44f285a41291e751a1a7059dede721da268"], 0x2) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000080)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) r5 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0186405, &(0x7f0000000400)={0x4, 0x3, r5, 0xe142, r6, 0x3f, 0x2, 0x7}) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x4e22, 0x3de4f0, @mcast1, 0x7}, 0x1c) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000280)={{0x1, 0x0, 0x8, 0x5}, 'syz1\x00', 0x2a}) 18:31:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000040)=""/156) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x2c) 18:31:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0brid\x00', @ifru_flags}) 18:31:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x12]}, 0x2c) 18:31:57 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc044565d, &(0x7f00000000c0)={0x7, 0x3, 0x4, 0xc0000000, {}, {0x0, 0x0, 0xb5, 0x0, 0x1, 0x3ff, "bd2a5bea"}, 0x100, 0x1, @fd=0xffffffffffffffff, 0x4}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)=0x3357) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="fff2e9237d5cb215f4151d0b40671ae2807f8b1d2e88cf6c872f8296dc681704d18918d0691ff6973e0be674add8b050b2b3b8c429bc1f9fcda592f5be46a469"], 0x2) close(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x802, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000180)=""/143) 18:31:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3f, 0x800) write$binfmt_elf32(r0, &(0x7f00000019c0)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRESDEC=r0, @ANYRES32], @ANYBLOB="6d49c7daa4ef41a84efea23795517d9a524e6270672455f929a0503c9ebde96ae8ecddfdc6eae1bcfc55e2ac2f50636e486760e09ecd143c83c91714c0be7e93f34c986d2df3ff86304618d88fe824d04ac3c2fcf243aee67c9ead79c8963756148c563312aa6b302f1cd83f15f40afd4b1fb96dc20fd8818a698cdc1c5f7263d3269019d1c1131218d8762ffb0304497b95ae625ab50f5b153429ec544eb58a51beb854d4c8eac5e40586bfe947fd5937cf80558a09e6f6ba0d1f0fee0a8cc02b4dce1ecdc57ed20e548538f01c4d509b5d", @ANYRES32=0x0, @ANYPTR64=&(0x7f00000017c0)=ANY=[@ANYRES64=0x0, @ANYRESHEX, @ANYBLOB="a4f1ea29c43281b364e41b9187516a2b07e6c575ed180f8d397b45f0b1e79e4efed08205e300c49c3805c5b561f6a8995ca5fbea96dbf45ccaf7787c10299193fa00a41cd803962f00616d6a64980cc9afe67f6f30c1ecd1d37a9128f7829d57e15b31f12bb90ba3336b0fd044e5df0b6181e47a6c40d76f835b8dcf98778181c6427e56f4507aed50347651067466cfeecbd6a4eaa12f", @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES32=0x0, @ANYRESOCT], @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16=r0, @ANYRES32=r0, @ANYRES64=r0, @ANYPTR64, @ANYBLOB="0d543c859a69c2e65082236260c6e63704dc5fb9a787f66dfca6a1ae79b7f2647b3904c50cef27c9f336476dd1e5c49a1267436c0fdaaa21dbb27d9717e305faefad6554c6d97eba5754da6c6d0a9069510733c25c6fa227f7c2b6e959555d03ed76e3a25cc52a863931e05449f1589ff83b16bba2862f75c6f5d5b9dc79902d59f0ee03733160daa772916fff717758335432f67fabea8bf87243019d82811a595b8286178270a7e232ac8d720355530f2b620cabb6c4ba7b3ec6103de47a7aa60c255f90e5cf688c7a", @ANYRESOCT=r0, @ANYBLOB="6f5455a087fdaa4ed5515e32259b64af39665f6cf15f55a59ebf0b15dbb8afd48b9fc48582dd20765f9a0fc3d1a15f29c6d4ecada2d071d6b77682192baecae62b3482729c8d3f2f938a42c5ed0d619c5f88fe9f15005f7c64ac38a325e233690b31d26af88087f653bb1c01f07e6fa9b4042e7ec7521317bdb23932b54af3ed3f0f337d2107f14426ceaddab7d26a0e4149dc105b12dabc493f513ba8b7ce6b11cbdcccfc156725f71a4b3d35ce5565e21cd2b8f868dca41659440244da71cc26042a863d48749a65f025624c09e4852653b927c5c4c31be196134b60457d0d", @ANYBLOB="02b52fe970786902a2fe5a8866b997923bc78f03d07049c45b5c9de83cb5e5a6eaf971ac85ebec80e015103a70a182676d79fd2ca652da9adac7d3febf6449c275a11b4ba9f353495dd3930c849c7564a98b099c0abe5cf3479351f7ea32adcaa6bac1df60e04337", @ANYRES16=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000740)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB="99743fea9844079e99a537965343bd9a95561b40106ddf6a3a8f9ced28d5b910a7292a23", @ANYRESDEC=r0, @ANYRESDEC=0x0], @ANYRESDEC=0x0, @ANYBLOB="be5d195881c1cb91257847dc02870ed3865420cf83cc51f3867a22348e533998d90e75b0b96fa86c284f61de902d926d049ba78d481097b92446b7dd3e8fbd347488b9393aed97eb77b166fd732d4be9096e58b0af3dfb40b45b104585cce2defc"]], 0xfffffffffffffc67) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4a020000]}, 0x2c) 18:31:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300300", @ifru_flags}) 18:31:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1800]}, 0x2c) 18:31:58 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:58 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r1, 0x9}}, 0x10) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0xd8) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)=r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:58 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f0000000000000000000000030006000000000000000000380000000000000000000008000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x20) time(&(0x7f0000000040)) 18:31:58 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000000000100", @ifru_flags}) 18:31:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4000000]}, 0x2c) 18:31:58 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:58 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x20040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001800)={0x0, @loopback, @remote}, &(0x7f0000001840)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003400)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003500)=0xe8) lsetxattr$trusted_overlay_opaque(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)='trusted.overlay.opaque\x00', &(0x7f0000001480)='y\x00', 0x2, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000005940)={@mcast1, 0x0}, &(0x7f0000005980)=0x14) sendmmsg(r0, &(0x7f0000008780)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="a77b3d6a60457d73e511348733f17f73b895fa843d21a60418cf1e3c9cc08d007af65a9688", 0x25}], 0x1, &(0x7f0000000240)=[{0x70, 0x118, 0x0, "f704826bf9ecf0e261388f39646185d56a235858892ef0ecc7edf96ace6ef534dfd88440f046dc3a655b6b78f9ad04a880b5c7a91c10a1bebc68e4ae8dd10e3c354c8ef4fa336d8ebe22b15b9e037c2e9d24be3a6eada08229fd9a5dcdacd738947f"}, {0x38, 0x112, 0xdf, "066ec9df90a83ad6b257f94793ec4a0ebf386700ddbfa4f8b6785044dc8e78880485b557bcae064f66d248"}, {0xd8, 0x11f, 0x8, "227fd1b135facea2abd833c8459c9d40d5e26a8c3027380675dae6f27fe8543b11b6c0b4b3ef47570c79b38bf5cac744410b9ca89f2c97416afd3c5c5a1c03f7a39a33145e5cc29a84a71ecb5dc1035234ec5fa144cd2a2e81218d70df779d1a51eaad2b6f4c2833ece2baf9fc0c20bed4d8c4299630f8dc81248e25b7561d883d731ab64156f2f4e030435c0d446d110085e1f7c3d8b35a3cfaff90056c1dedcc6fd172976656c58aa97867ea319217856c76449620511cb2ffbadc80c4cd2520a8d911398ef2ad81dc3ddd"}, {0x100c, 0x0, 0x29, "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"}], 0x118c, 0x800}, 0x2}, {{&(0x7f0000001880)=@ll={0x11, 0xff, r1, 0x1, 0x9, 0x6, @broadcast}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001900)="a821769ebee102ad001301880ef4236b4a655ded5b9401312d2876f711c90d2fa685cb8a48ce15ac347b12919ca8efb0520a111593f6d87f83723737", 0x3c}, {&(0x7f0000001940)="d5b38083db8ed74a0c2646ac3fccb5a91a370d6b5baf4104cd9413b69111390fb5b90bd86a8181e2e067ea3a9a2fd05f2b8db07c0b16d4965afd68534e252c0e962743d92fbfde73ddf0e20a2241fb0be857f6728c7b31c8faac84659559c96feb7150357fb1e97d35e883d05f45a4bd49b2787678380b0ac521c4db0d702072a4269b0b876e59cb9773571e598c5042a38d76ee7b0bfe957afefc6f5b1725f05d2d471137eb96d0323d8f5af674e856355a1fc5f8c16108a63635a2def8d98974c6d4ca0ba5ce296f90fc54e26a538c92a52e262478c5a56ac08f72bcba36b8835347be583f502f0f39a210c6ed00f8ec20", 0xf2}, {&(0x7f0000001a40)="8e2b4e2cad05f1c390ea48740decf212f15f50b07b5f00f83b6931d1855d43b701", 0x21}, {&(0x7f0000001a80)="8fc4c067148831f541a29e53c2eca9f025295e63d33ab6a10000a6b9eaa9c12a9a8faa50c7859013455131d9e4c587223bb9abcfaccb2724ef37d3674bf5353b10e84a93964d1eee5b582ad72e60d1504e05a2a5cb4054ab65bd675b3833a57cd435014037d9ea3783f67553b29c767e76c525da87fdf5028567d57d", 0x7c}, {&(0x7f0000001b00)="d1f6aef411ccc145910d24ea9c3e51ad9e8b54b91a8065e58506de05c6204fa9b6b45bbb4d3e67f2da59766318cd4387c3aa79f2de604cf3d2bddffa79cb2afa565cc0c3a1b7672b4d42a0c9366b5a4327449d943a402677e14596ce7f616692936710b430021e9d2ff61efc", 0x6c}, {&(0x7f0000001b80)="df9bee81051c4432fadd4149ea7140ab640bc254a63ea7a4a6d9f3fbfb029903650c90904cce5b38f37c5a9e90f9e7c41dd6189b206f2de16a5d26cc8bee87ff55f6a5ad2046f9b736e31e5766c4cfbc450a9572f122b59ea0daa57213613f95015b82bc281648406756fcc7b4da19332e66630596b4dedbf60db63e28e9dd1b130d670ed03011970577e8ff028b2748f774e6ca144a0696941c455e96945b83f25cb301d1350cd8aa9c877fb165ce074c5923f0e912e3f05157d53b5eb6af9e", 0xc0}, {&(0x7f0000001c40)="85bb00f2fbb1a553d0ef9b23d808a888868762fed3f11a6dc96669d296c16dad7a1a50f1f90bb8c4311cd53401d54224b4f8ab5f3184a52856cd", 0x3a}, {&(0x7f0000001c80)="98cf23c20729195853f84ebc17bece776616d19060fdf5cda7c1b10c54903f6a1af5071637119233374b07192074c73e6d26", 0x32}, {&(0x7f0000001cc0)="070514bb47c319f7d04a17d3577929620d6f26cd8b7ea0ed191ad62b03fc9670b031422b44cf106a5723206dc069966b2d8ce7702538e92a14194b12911f42243d9e7a35a8f89a1a77c6c32353", 0x4d}], 0x9, &(0x7f0000001dc0)=[{0xac, 0x11e, 0x1, "45ad9c115f98b6a2aa4bc919d9e751ae6b332e919ac0152dbb835418c5e28991be0245fd9567822bc706f5b157e0c6a0579a5fc595b453379bb6143d9796e9541a59c73bc6f2dadc33349cc823a13899567f6ead610e60f4d676814246757e3f67b81ba28be712368a18ddaece5a26e2a06096ddce791145b68a842d1cee0abfe84d2ade0f45910c33ad6fb2d4e401553b118fc36fc04ae9a064a0ac8520"}, {0x90, 0x103, 0x3, "79ebd14f8ccf0b66b2c3303d8e2e7df500dd92995836dcab3b682d59642c0d55c4a97b0d5cdafa711a8401b2b5e32c1f6d8dba82aa03882b2f1510d513d132c1632134ecc4177e57a2216c11807592f790478894023be49a3cefb031964a59f2a3c3984b7e11e895ea5bbd57594fed85c9a22fdea8a496b901a51fb4505fb60860"}, {0x20, 0x1, 0x400, "dea8ea81c3cdaa8c7113f406baa0f57a74904945"}, {0x90, 0x115, 0x8, "68986cd78adf541b349e544aea2f0e3c4a82f868a5f4111cd518d7a2f8709b1ab9ecd798bfbcd312988e149c62723bc3517ff0b269639c8cc6e2e4cb8c8f5122d3e6df024042b1867d5f4df8bc0afec49816256e933c030d2e071557b67ca76ff1d11ba9e7847646ab07a6848ea44d8a66bcdc9dbfb2221e57ab4daf8aceaccefd"}, {0xd0, 0x6, 0x1, "39dcd3411042abe4ffa8838aedd179e24ac1151e7e33464c216747087ec97c42a9b40285a5f3a56f73179430d9baaa3e58de190e3c136551bea1bc18e47144b0b266553deb9181cb6e889b7b3155d90c8702c811572398114c4137cfdc404a207b93508a1c0d84e3aab358de93795de72153343748967c095f69090c4052afec4eb913f7abfe92c7312279352a1d350d86a5f955633ccee4430d95607865359bfb6034b772e1184e545ac386c2c8c4f06eda3cb90d9a89e73444ea0519b0c95e79"}], 0x2bc, 0x4040880}, 0x3}, {{&(0x7f0000002080)=@ax25={0x3, {"8a6d71f9258662"}, 0x1}, 0x80, &(0x7f0000003380)=[{&(0x7f0000002100)="34c2117db82ee0729c53f47962cd662e05e4683536eee2763da64c7499", 0x1d}, {&(0x7f0000002140)="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", 0x1000}, {&(0x7f0000003140)="6a679aa955813eac044bf730814f0fda0a909e6a1cbb", 0x16}, {&(0x7f0000003180)}, {&(0x7f00000031c0)="6a9140ad76ab5ee6670886b2276fb546120f575cb00f7095b639625f55546ead15a5de2bbe394acbc2f576dc800280c826a243064a64dee9c1aeef97a69ebd9be6b1efacfe5673ebd71f34a9245029b6300cd5b872c01b63070b54a2725bdab3365635c387b208b90a48952e93a50f3b3764bbe041027d009e6054928da986da86c10a236abfc63e6c0b098613b54a7196576dd8a85c7bdab2f11282ea7a3d7543650cc781c52ce6afdd7555c70eaa9ce204cd6f43a63b0de0f213884e597779862f99d4de570afd0ff0438dc23b05f986", 0xd1}, {&(0x7f00000032c0)="b21871a52d7ae6e597beec68ef6faf2a8df6fdb3e0a1af3d06a7d5bcc170cf2aac27908a1f0ee9a9d96cbbe1930cfad0f5ec52d04e62a7c7cdcf32ffe9c9ac93b2d54f2401f9c68ba4f5e72238357000b6df5657ddfae3872fcb0d2b7c3cf9cde095aaf8975d8053bec62b115c433b0ec926edce360a54dd0f6576bffb18070e7a80b557253573272aea1277e465dd24503c103a53368d07b4faf6fcdfa92283c5c87b", 0xa3}], 0x6, 0x0, 0x0, 0x800}, 0x3}, {{&(0x7f0000003540)=@can={0x1d, r2}, 0x80, &(0x7f0000004740)=[{&(0x7f00000035c0)="a4b565a62766577c210ec9956365ef67d9bcf64ad8bf8cca351e4c2a35e4c673cf36c14f62ff1bea2ad5651642472062", 0x30}, {&(0x7f0000003600)="859ef54c016e9d1a8c21cf7c45b423afe3f05498763c1f7e5cf31fbb5e5f8175ba487becab83944d73eb2033baff22589bdf3816a5250a451e691b53c703c65b", 0x40}, {&(0x7f0000003640)="ca963aa43bdfe64aca7217ebb829d4e0fc64ef996efd4f15c751df0c4173ff41f879e08a1488c2d4e34a5363357a3f007ad609849fb5f6ad616b1e469f68910a8a23c720cbab37e1513bc57eb9d8671d60ace79b96df3025873bc18d34c1d2c773b595e25c22a70ba2", 0x69}, {&(0x7f00000036c0)="bd0f943eb2109d56ed4dacdfe19acaf550c997e13b5c5648fcc7b6a1cd7eca3cf0db9ac8348134d484b4e13890e1e91775800a2e71ab1e946aa34899bc242a616ffe03e20721f8c9c45c666c49815311393f5000606f7db87eecf0c9082b855fc506c40b015688815365fdb827ea1d5c7f2abea245abf92699bcd23784c726e047a2a0f85861004aa2f80fcd25002942c994a8c02a292d7463bd97f04bec9be11e651286590e23fddf40d86c84a415ca032ace025be24a86575b663e85767c6d023f26e0e2a8b6e732e9458445b375ff8bc6055e0e647fe3f15a9689b95c3c1333f238e06d32ea94effdab20aafdcf785309fd681726378c907e02695af83b776c8a18afc2573dc5ad6a4d24489c8bb57568082b9b33635b1d195e08231da9941b3d98ceeb903a66ae7386b1bad58c44bca632c0fda7a95fbe972cc59e6d053a5386bb5d64ffb3d38e60a02743dfa8f02aeabc9ea3de0cc5ad7d9cbc31f46d3ec059ccbdc002cd87d339077fe746c4ec0fb61b1196b08a13ac5be909e9cb9f8303a791151e67bac2bcfc22c19e5e831c2b1f612cc38e804d75d8dcd641f437eb912b93c4ab54ff938aa604b75241f2dc67bc5b5f88c8ab3e89010f55b139c8c5adf47e66799802c8e34b7a219de4f8f1274bba128c663d035a1d09783e44d5ce9b6bfe1b04336ec5015b76e951bd229728aa5b0276a7d62573d5487693c2e987a128eaf9cd06c0a68adf94c9ba39047dea6ccb1128a2e2514d703f316f9b00c12fb4688302a5b8021114c6c074416348fcad4823f1b2b00612e554d7ed8053461d23c3926de542403eefbcb4005ffa39fb254e2f13fae10ff5366c43e518bf65ffbe296eae4135fa12595d7d57fce9bd08583a081a174aca4e89dbd5fdb182b5c7aa7e4f93ca840fc78d9479ead3e215040dd603c03dfb24660596dee5c9c0f21b2f02684ebc5744aadb4426579506702ae22cf333290c7d7f7b700de2d7a1b7e22bc85cb61049fea487b9363fcf9547f06c96c31272bf9c85b583ffe8c3c53f94c74413748db1dffb6aea2f7867869e63442b294531a7d282994bc2d6ed9f40fd3a31b5119aa5b6664c41cc1ba98cedb16f2a46dc178d1802f01e194037a707bc114daeb9de8a143b92f484e4e49b8b87351376e78188a95da89d801cb054973a348db556dc47a004be06ffd5bdf9a64f1b8cdbb9a572d3be415916ac3cd767c414d5108650c08f7a435ab5df71cd35ce08eac5a2129d52137162809b009005fba1262698557ef93dd53b95aa89f53f5bfa6a7cf73c2943a6f35232e7f00d359bbf6a3a0274108a85062ddabd8dbaeaddd7cda5475a8105c24698761bc5d3c7c9f79fecf600b0e0b787fa5754a7c3b06dfd3d5e0d4023f55a8d90a301de5298ee8181b52acc357b99a776225d6ce0f15ff5f407a1f4db26b8d8402b24af5318caf608d77e44c5327987519d03c8c906fd589aba7dbdd82fb875a1f305e36f3ae130d6a4dedee070637c11bbfd3828ce527723d914f6e2e431450a32c8bab337f7865118aa56478a04d492ef3d3f487c429637035d2c01ba754c349ac2be459ace3a1559e2794bfcb3520b1450b1b9c2d39025feb368a20dffb975c951e032fdea368bec6b5a15ae66da32d7c1ff498cb244c418d9495b90de92ad2916fdd013631f8dd8613a7d683263a75392e12a095aeaee7d35e48406c0f24a12f27df3b9a907467ce77d55945e1fc4ef720582dc1f03ffba0341cbff6a935cf809d65c8b5aec4dd029914feb82ef077b76e3f456a5c48442f326f09c802f865cec1d5ffc20615e42c3f9398502fdff98c02a207dfaf7ea3b008bc245ade9953474a580ab31c5b550cac6bc7cb672ace1c29b2b60a678f3e9169d7b6526e77bfa7fc278bc96968b9867c5d6de4f1c74839a4e59167b22b0964a5228c9234f9668dcdc8046b7734c489d02e36807b71950434fabf70af980f1706f924decd16b4b4bf7b876d3203edfdc3d7ddea0f33d59aeec6cb932fead736ef4037357045b4e88169684c040f91af420e95f4fe59283e60fa4202eeffa467dd40e3ba98b79548f6a48ee1d30fa75cef573fe491ba72983c0b3c1c294cde98f84cf6806c1a05ff0020a7e7d462a970f823a09d5a5280782ff15b886c568440d53d5f6ded522ee6c83198f1610ff87b704b075a3ad0a44e9a6083dd4ee07a59d45fefccb9b731a5d94f2e97499e3e13cb16b7acca841e9db3855eda86f23c290eebb160a4715aec0153319e1282d1eb54c19140d9c09d8665fb3d8b28b9e2c8d42ec8eb790489833ed67230c83fa2edb0f84a15174ed9a31a6e37d9f512dc90576319cdea8aa1f33b3898d27e19d5fd051e0f5cafe8d698473c60bedf7fa53d5bf22ae23ab26061461246340831657c9b57e0847e9f4998ed193d81bf8445747f6db5fab847f54412baa735a4349dcc0c9d0c18eb59fca05492d1c7e432eadde710372b8bee4f80ab5bd9df74d813843a43336433898625e3a8fbdc2415e03e16a13199b83cf3f05521278d7139eca7f8abb07598529b5d0968c7479058d356b3b0a7068edbffcc2dc5fb1441b6bef22f2da5d1c8f8ae51fe07012ed7354e72207b1d50d29a04abf38c4b0daf63f4d54e0d93e0611c38b92b46cd9de666b2144a6e8994494f8f5f6c55bd43a10ce6226c6c7ee8bb72809c3536b611af7bffab99e54318be6a8613fb151154255a1f890c1f2e80e8a896dba5e1330051acab4fd4bb606dc45f80c2cfd305da2788f6218ac9e72cb972ec0556d779f86f01a60a9f27fa258de52d1760e174a4b6741e25a2b5ee217c5d4c3a3ed23b56ddb35ba4c5217bc93fa01eac2bdbf003dbd220beb5b4fa466f61893e5766ff09ca4c1ef2c47188a3b9e872178f4be50fdbc5b5223caca62fe2d06b64eaa724068d2591b9e8dc66593d3d9b81f1884aaa4747b5c2bde39548b0f1743bd759e22461104fa73f25be11fbcef7be82a5fee58170b63695c10867b36312249d5f04a76423a4ca029d6b81328002f0eab4482eadeee2225f51c8b474ed8e29bfe032fc342b66ba825c39389fed1869db53ddffbfed8fbab251821dacccf849a959ffa84661732e74cd8fd3023384982ee78f55933398001165fc4a2e61e5f6be0d6e2e840a51ca4043a5602133062aebc908422801ff66f2d93d01745788377598bb79b793147588cc73c8ac2e408762d7a4a960a3b050b2c48e1ba2063855e88c9adf83710f7ca0d0a724f8cfc2cf509d9b074b2fc8aa5ab4f5f732f3716f20bccd9484114a348fe2a76e67d8247e2f81dcd84b2af1ae46e4e541a339ddf024c3403edd22259cd2e50f213700821f97b139570c74a479fa6299e19b81e4db577e7212fb71aecce7c75ac094a7536755c4ec85e140dbad75b31303e3cded0c59b1fbe887814595e2f668479074b9bbefbb0474a2e31d95e8283df2314e4f1660ec72b534fe6fb035cfb254a7a178ebc5e4579f0c3b36c12c18adf0ef3aecafdeec8575bc5547e26eab0a3589bdb1525c7b410f3b6a3cce36cf3c60d2b1cf3b6191dab7ce27ad994c45f1fb6c0a6b835c96ece0c3d72c1094b75d5c6142f9e668a5e806561bf3850c2322527b32c90838fe56b26889a28a4697fd60a7e4d51996ca95fa08f13a57c254ea73ec600ad240956184189236ecea7e0413bbb41263505ad8aa8b96cfb6dfb2be14f1b1e5f9dc14d72c00fdd0db51dd2b7e82b04ed97686baf3a31b7778eb730643da1d9964274c7e5de8b0a3eb798df74da0f01c3e0e79cb69ab72fab479dc1c50318f5fee84a45c43203d43f389783f293904a08105d1df7594f29a5ccb963a29b1290cd1bc5fd20435eb34f5714e3765b7b9d6064ada9bbbc2b105496e9799e080f22bd764271b2364ae879734376f7f2317d761428f77853aa214bf1a7ff7dc5deb1baa9f4f918aa55dd26feace53aeb8544414dd4c4f334246f590ee148a5f8ff5eb18ddf7fb7b39ee2c14fb086d50b451298705972cdaccca53e2ddebf82e93be1fc0e2af1ccdfbf8583d310f566ecb64a7707b0c1f29272d17cfa95e36b031fc3b753b04f4495e3be7828b5dde602b2a17de8666f46aad007a81bc0902243e458f9f77019e06136bb5d23de17a49374b7cba20e4e1027f22f533de10fc6f15c57e3bcfeb421684ad2141a96f2dcf9a1f7f74b1d4d3297545ca26e888997639cb1438323f28dbfa396c94bf5587d5bba60464503e72cd85e4b81cccdc1edc1d0b212bcb27507cfc9e5e8b0c81ab7dbe6dfe8589500f92a4aa346a8dac7effe3dcc3c71c46f42a6848380cd75862391aad018c9711f4d689050e183fad22fb40214019f934eb5b7e891821a99c05798a7c95ca05537db7c071d09abff53df70e65b385f256a65844f9989ab21a5ccad062f97162bd66dae59991947332fab26936f7f41757ecd2f0434dac76f6aaa8033be2a42b130b4a6551c0f3a5adb049a2e42250ccdd296ce44f9ab129b969aa19136f266a0cfb96f74dc38827185556b9422dcd5f8278f9a4b61fdfa1d234a8133828de869885ddad5453f10457841f8170194b999900e41756211bf414071c2678948acefd32dbf761b25807c5a951f3450a2ba0ce9c6b8e39c021aac419bfdc29492fa596910bfff742d86718e1ecfd0e4c8329e5a32fcfe89dbdd2ccc5b7f4846dd998fbcc991d0294f3a311822362277ecdec69262ac1be0a8f666702dab526379af494e0ae0c83c276c9437c866bb64409e11086d256580914c21f64610ed5d6f60569dbd0fa69a8b30ab9e6aab5fc1d88b0f4480c38c8098c62c6d1b316bd4bc540569b3f29f5d42bb101563a9dfe44c0ac169e35388166bbfc130e64aacc7b37e7e9b7e627482278ad21d7fd6828d451d576caf79f4f7b04877d7720cb50c298c96eab9016bc85b92de89276a45ebd63d38ae1d41994d6ef4ed2c7af49a94eafb29df3adf491e7ed24f6383561b6081b9c5d034647ad43e039821ee09d6fff3b1081d11b8e736d9e4297233f855a65090af7bd25a91148fc3784e87bfc7c82fe680d0f18758a1f76467c32ff7318cca018c1d7b6d2799754592af73dc9668bcefc6f36ac0f79dac75b75332fe5d65202b24501ed4c6b0ecf0864b12af45a4bdd59e0a33b7c8ab296b1410f483dd29cf34d098444293266800b6ce30147c788a4aaa5cac11136d0392995c221e466d744fa3ba209c832178db7c67ae0a733b84a2419ce5eb7091c16a13a0a0cda5e427d8e9e41fcdfbfd2d482f9ecb860519a371f3c51a09120e3fe37823fe057b354d9e0b641abd36458fcbfd880a5a28702d876ded54725da888c9d0f2c6a937bfa1b8cdbfae7ed8f4301968ea04148d0ec721897f3fa941b256b088ed8c822cb2d5ecd898b75d19e531f70874f4667be28eba190d55a7a0d124d43cba469ec15b82c8768e1266e96a6038a4d98697817a39b9d4b9dcf2884c19f29f27cea72d3822c9d98cac4d5dfab859b75351f593f0607a9534101d49f4365e7ea41be3930dd75c30d1063241a48956386f903dcabac25ef0992a146be3609918d804528c685750dc0d08c8f1bc646903c7087582bf1cbd9eae9be8d9ab8d0c1345cd6a6fb3da96aaaec14a6c02dde26159b18d2b14457e76a6f4c568862dd8e69a4a2b47dea5b3b57488a789abd56c5194556ada38895307be56b91b78019fe06132e93f757aeef05140dc88c86849f9b63c7371ea3e20534c222201ff7e0237e8c087a2d22b1e8e38f934a1f1fbce88fbfa428f553f6bd6919a23257578108130de3a51511fc768374e", 0x1000}, {&(0x7f00000046c0)="c61201b7afe033ab57aba8b06d5c", 0xe}, {&(0x7f0000004700)="af9c2830a2f80333ff8a091e56c6c650b1148d31a4a720ea2be6ea45948436dfe1cbea4ba69be48010f5678fa232d8b8afac0564e2acc3f3572d2258", 0x3c}], 0x6, &(0x7f0000004780)=[{0x88, 0x10d, 0x200, "6b0751ade128f3498bb59aba48581d4446ce00659e321bbd35c565daa2eb410ebd826298c59b145826f4120e2d8978a0dd668af6966df2f356dd8eb7fa481517bae888ecd087e4a716aec6a3d1284f1062859c148c3d6ec973b29bd74e882c0e285bd9da94537d078e6ca624c417bc8bd63db16d4a327be99984e1"}, {0x100c, 0x11f, 0x6, "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"}, {0x28, 0x84, 0x1, "fb665d211afcd0c80ed4fb4d3f1a59e21f733bffc7688fa728"}, {0x38, 0x101, 0x6d, "c0f78331ea52a56081772d43ebb0719aa523bd936f60f0d62bd4dad2c864a581118b84f069c43fe1ed9a9d4a"}, {0xbc, 0x103, 0xffffffff, "1eab19e2f5ce7e8e7a51b04f395f5012d5b69a2c14c8aecf8350033c1b84e440962477106f71fb74cd66504f61b06be1e5315e04005121ca1e7366ca47825b7f7e249182a8b5efc883d921c2b29d768bfa22fbc38f2436d08d3ed5f37b9a7391056e0bf20d77e0295cf2aa675b6e48c7dcd627bca4dda99fd120ad772feb37c01a32fb86dd035fd303a41f4c46366052d4a2da81870a63dc25e109b8df75150b1906e72bc190903b496f0bea93"}], 0x11b0, 0x10}, 0x6}, {{&(0x7f00000059c0)=@can={0x1d, r3}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000005a40)="bdccd50400f7eef1d2799405db3b717367ec3e1ec134deadfe64d80b3610a9b5b1022b613c156552a0035fe8c3f6866d9f9d79d39a54d49daeb7104e8a0dc68cdd41124bcf3c992caae9643faac9", 0x4e}, {&(0x7f0000005ac0)="d00272b783c4c38d8f64467afdface74d3cd3a70", 0x14}, {&(0x7f0000005b00)="be207d", 0x3}, {&(0x7f0000005b40)="f43f06a603bb34d643ef677028d1ad8ac1981646824dab05c15cb5554894514d85f90af70d536f6417c81a065dc0c38954ecbccea25bee119adcd8189621fa03b364cfc89f277b87694c1b4a4acbfa8204e04f3c4d55d81bffb706dc4bab8ac1e1e53009427be400398a62787fa6b9dc87a88973060de6b16deeab94f25e34b3b5cf71e009522c15343d3b8187ba9bdf12e56441840bb7d162ff8e07704c89796e9ab87ca3c8d241ffa253bbbadd4d42dc3ead5b9ca1845d33e9f74c4e02b68c3a1c28acbd9c03cf6dcf68baffc646e511833d68ab4dcee894eff791d7848989d52f1b85696c5b0c7aa79a341262f3d6", 0xf0}, {&(0x7f0000005c40)="46ba541718053cf0d17b14b714a21d8c07422d2a467864de90e8e214c1027fc4f70fc7fb16c3dd8db166688b70b421e60f9af4facab1da3faa23c623cc9e364843575d65441bb1f42fcf0b8f47d95729d853879c853611ed488a9196c86903b430790b0961b9c8511c9b6c9518f66bab97bfa9d5563f9139ae923a730d9b02a7e3a7b807df22354df29db576471b5c9c040d7a9eec2079e1b80bd28790a66037cc4e511909ec5bf9df5e315a6dffbf5d942dbcccd2045d866c0ad01f8d1d8ee7ffb3041ba7e3da24dbc51dba7324e5f78dd1b2ad9d641b15b8ddde3dfffc4506bbb6bee30f3c29e3", 0xe8}, {&(0x7f0000005d40)="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", 0x1000}, {&(0x7f0000006d40)}, {&(0x7f0000006d80)="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", 0x1000}, {&(0x7f0000007d80)="a64317e2ada2cdd9594e9c42c36f1be920d3f514bb1bd0926331e1eb8ba30e389bf556f2dc91df29f6ff34c8e869f0916fcc6f66f32304b4656ee0", 0x3b}, {&(0x7f0000007dc0)="e35ec8f66e247804aca10b40d32465d21ae80526aa056acb139f2a6b1c9cc2ca75edaea1bd1c00462591a8c704b5a6759789c0765225d1b0c4", 0x39}], 0xa, &(0x7f0000007e80)=[{0x104, 0x110, 0x190, "e15ee573de7f82b675d5d4287cf8de7281808b45fa63b9922d206ae9cd60c3057f045eafd0c7b64e2f2738d2ee05704d8476bb4716a60b893ea5f44466db3fd86e550ce71ac73932396f87c657a8e7d9082931d51570394bf7b1efe1a1294391f969661cfb12da538dc3d695f0d915d87adbe36f879f26899cb07243de10a3794832e3fa8e420575e6a6766e7857e452eed8f9cf0f3f77b3a09fa8d98498d08adec9cd8211ecf21b1caaa996acec29ae7e2fa8452e7cf91429cbc6822a9cf9d5e2fc4e54382cd84967aaec2acb1fa6b9beb8ccbff5879ecd979505e40ed2b2d635fa4c321a3b5296ce475b8c697bdfd3a0467157e1"}, {0x84, 0x10a, 0x7, "14d6aa08bff63f28ac028ff2a6ae6ed3a510caedbcc0fb59d9103bd66c8751437632768f347c7d3190cd3b22269d5eec7bebc506eddf9e2517a66628bff868456a1260049ee80d286a5f6efd8940bf19e5d18038a069c31c272f85ed65ad9968f30bb0ae4a8178b070369eb8903740fa7d9980afb18771"}, {0x5c, 0x107, 0x1000, "fe1eef74df5c49114f7d4cf43822aad767bae6ac3a60222826a4140c041203f53f17e1a45de17fa69c5bd747e843a1e0245afef485c5ce09b7c942ba75a0756f070ff848ea3324b9aa7db91133e0f6"}, {0x84, 0x13f, 0x5, "c2749218076801b9f7bab7b868fbf9c9ee8269992b2e1ea5df60cf6a3db17e460cbffc9645a520ca82fdd1adb618a30a9b198b1077a083bd618f6158e915d2e7d852b2d62e90e4612cf4f941fd178cbb0f8ad1a0fa511940fb05bbe9c3e3ba5e33a07c6ecef295449bae2f269e121e39f62f551700edf6ce"}, {0x3c, 0xff, 0xffffffff, "65ab7ee846d29c055a15e2a578da748b3cf445e432429d5608a25e980400fd9edf5e814f289ddc476a8a11e043d5bc"}, {0x64, 0x139, 0x1, "b6588bcda677b6be818120df73cfa9ef7d4cfbe50d3c35ca55871af054926e873e841bd8e2ad07fd206cd8481288a59fa7a25893ef7b59de8fae1ed187e497fd898e5c8b7b13d9070e15538d5bd2fb7c665bf1cab1"}, {0xa0, 0x0, 0xffffffff, "ed93ca54cd4c361c3d1b10c0fb0a7901e99ea7f58befa4dc742219deacc8972fe0b49ce07d16d964b0cc5c06c8394e83b43479a0970b7e952417822ec389fe260be93e9244841ed2148c6bd7ca4d17762d5f9a32d3e6edc6b00ba284d898d863b589330fa038140e3f15a2d01332d9e2e2a9752fdab4ec25a7d8c2570e7372e166251caa5003c0b8717674007ebf7da500"}], 0x3a8, 0x50}, 0x9}, {{&(0x7f0000008240)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80, &(0x7f0000008740)=[{&(0x7f00000082c0)="2f5a6d1a8b7f15cf3d5c4ddf1820829da84f6560355788e6400795bb87b74305f7518e0d23a6c83802b458915e8f6f6f19f87acaac80722fdae9b63f7a", 0x3d}, {&(0x7f0000008300)="8d7a1b", 0x3}, {&(0x7f0000008340)="497ec67f35527b94eebb4fb4b083f8a090735f04", 0x14}, {&(0x7f0000008380)="a2c9ba045aec3df5ba68347b0ef5ae70911a31a0d68f05c24244a413486bfaf6b4d4bc0d4c03667315e8f1e77dd68a96adb3c741888bd627528f2cf7ed32af12e797de0e3ce67cf1f920d5d8c1fbdeb04df0ba6bcba6358ac9f4746c592f6a2c93e67a8e9f56864ef006c0244d9ab0afb492fc7731326b1befb4c981c7e1b0e37c0a0804b6505070896e2135", 0x8c}, {&(0x7f0000008440)="fe11d2b2727abc6882615f5f7eb46b33d27e53404115fe2aa419812b4d7aab4dc093bd72c16e8da18e604f34df048bb38b9709c8704555bf7517fd01c1b492d2afcc9b754895a897af813fcc38005237efdfde970df640e454be60b60596f094d68f3cc901aa7c59eeea6dd44b6df7ec11fc150e9bc2845a7276ec8b596c410470e129e4ab59ed5bc5333f830c5dbcfdab90fef37ab25f35a469e49c3803c3c4d98562f38e94309a63fda4457d6391b091a5c206559c5a87528ead81f7a83abd97288e104ba696460ddf8deb29a50d32faed68017b66d61f3674679c69f748d447a0b6ff593a68edb52ea5a3a0a1637415", 0xf1}, {&(0x7f0000008540)="033f6b80eecf232e6a19d2604607948c37c83f4e777b73acb37a2b9ac4139d3e893cc7d3deb0c0f992519b59fa828af6c51aadd78e59a3b53beeb2c05b00a95f43d4a167837109c464b9b877d8326fcb1f7fb8c7a1dc3d19ab11b8538b21421076c754253db0cd53bbfe04def6eb86456611fb47484715ab0c3b57965b7acd6c246ec508d903baab31994d100d939abe5e0023b9b1fb5c2d92ee28c8bbb4e721353a6610028e6c423865ef1a8c1a0017ebf47c0bb51799be85ee423e3ca788f06ea92c64afac7b6bc5b3b60c447f6012bb05205327e2020c85c64fc66060e3936b37e48c01761309f91f537ec314", 0xee}, {&(0x7f0000008640)="0a6c98617a187be4d5f23e881c5dc34b5ca0db039e208d21762bf921c827c3778f1693d27efc1b1b9cc9e447dee5a2c91d44304897504b6eaf58dce7b5cd090a2f71529dd3242c53c1bbc8ede0fc18961ba0fbc89519c702d69f6275eefd2091753fbc56373b8b8b46699bf3e23a748170cf29510ffd72c02703b7645dd3b58b322fd7869c0f4b082732d65d492cc85a653ca060c9736225b888182a18ed8edab10f5469283899afbc4cd8a7165b0b04b4c099d1aefc1de225c1d89457292fb6ded11692415aa5438a9cdefa6bb20e0e2bd9d1c916cd9f", 0xd7}], 0x7, 0x0, 0x0, 0x4000}, 0x80}], 0x6, 0x40) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r4, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000000000000000200", @ifru_flags}) 18:31:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe000000]}, 0x2c) 18:31:58 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:58 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x5, r1, 0x1, 0x1, 0x6, @remote}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r2, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r3, 0x6, 0x1}, 0xc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x5, r1, 0x1, 0x1, 0x6, @remote}, 0x14) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r2, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r3, 0x6, 0x1}, 0xc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) 18:31:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000000000000000100", @ifru_flags}) 18:31:58 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:58 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000040)={0x4, 0x0, [{0xc0000000, 0x2, 0x0, 0x6, 0x4, 0x6, 0x2}, {0xc0000000, 0x2, 0x4, 0x27b, 0x1f, 0x3, 0x7}, {0xa, 0xffffffff, 0x3, 0x1000, 0x3, 0x465, 0x1}, {0x2, 0x1, 0x1, 0x2, 0x3, 0x7, 0x3f}]}) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4000000000000000000"], 0x58) execveat(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x1000) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x101) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:58 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:59 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) sched_getscheduler(r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x4) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x2) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x730, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000090}, 0x4008000) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) pipe2(&(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f00000003c0)={0x7fffffff, 0x63, 0x78, 0x0, 0x0, 0x4141}) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x3, 0x3f}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r0, &(0x7f0000000400)="8c64a5a3e1ac74e963586c6d0c5500d60d8303056014cc8184f03aedd216f408a6a2386fca00fe78e3bc042808458b64ec5be5cc70738188d03352dda9cd8cf4d126e38babd6ab9d3dd61ec6ddf7490b7e5caad3eb8c41e89262c537f6802abf4708b55c0556a2776fadfe75c3b6b01da1bc91cac08b4323260b7a23de9ebf62599a6afcd793d1c6bd2234cb15cb1de81e67090b0cf63b5a13c2d9b44fe5d77769989f30c232", &(0x7f00000004c0)=""/103}, 0x18) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x54, &(0x7f0000000340)=[@in6={0xa, 0x4e21, 0xf1b, @mcast2, 0x80000001}, @in6={0xa, 0x4e20, 0x0, @remote, 0x101}, @in6={0xa, 0x4e22, 0x1000, @mcast2, 0x3}]}, &(0x7f00000003c0)=0xc) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/214, 0xd6) 18:31:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00dirb\x00', @ifru_flags}) 18:31:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xdf03]}, 0x2c) 18:31:59 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:59 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 18:31:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00@\x00', @ifru_flags}) 18:31:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) fcntl$addseals(r0, 0x409, 0xe) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:59 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9c02]}, 0x2c) 18:31:59 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) sched_getscheduler(r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x4) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x2) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x730, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000090}, 0x4008000) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) pipe2(&(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f00000003c0)={0x7fffffff, 0x63, 0x78, 0x0, 0x0, 0x4141}) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000feff00", @ifru_flags}) 18:31:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020090000000000000000000000000000000000000000000000000000000000000000000000001a00000000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x314]}, 0x2c) 18:31:59 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00@\x00', @ifru_flags}) 18:31:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000400038000000000000000000000000002000020000000000000000000000ab000000000000000000000000000000000000000000000c6ca800000000000000000000"], 0x58) write$UHID_INPUT2(r0, &(0x7f00000000c0)={0xc, 0xa6, "a4d6896da7b077b7c825aba28a902c256e7592fb1cdf462a7e47d7356bd241784841bd0376ae1de92c14ba27a4d86a3a93c00b46de0a6eb18d3c5f9b7bcff2f3f4dfa4d2098ca6323bda1c1e06d9893372be9e5773fa473eb76e5da8315c6ca9750e26b5ff4cc6e43df2918823eaced1150720a06c50347bd0d85c75bd3989e57d12349dc96ddfb8f8c3c3f5a21593b9c9a8db0b4955f08247ab1c9211d829f7c99c03605d17"}, 0xac) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 18:31:59 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 18:31:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioperm(0x5, 0x6a32, 0x100000001) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:31:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000000000000000300", @ifru_flags}) 18:31:59 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:31:59 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) sched_getscheduler(r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x4) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="b7060f85589e3e217659485f4eb60ed4f1e35adbb6504a08006fe812efc6b73e3ce2dc7f745a093915f590e1d211cf495431ed8ac11003757f18490a93cac4f3bfefb214deb801d2763779edc31218fa5cdf357b10d2d48ae4a8351a0d9be5f1014b69f6f843020000000000000057b7b7e762241a7dac92471e5af80f762743f7047c0a97e390f2897239edafedcb9193f9ce6a06c49c0fcfdd89f2fabcd5f7dcb4c2397be2d72cab6668d49c48bd9ada29e9273681ac07dbb22ca622c5e53383c00808389d8e46ea84c86aa69e8cfef8e937b00bd4c2ced7e1e0a0adcd6fbd43e303a5116d67aea06eb2379cf3f3b8004f83883f71378e8ec1019ec0dfa2b61fbc5e43dc6a3e933f870a456bf890658e6e45bd45310d177e95e3bf25a330e5857b94502df30000000000000000000000000000000000000000000000"], 0x2) close(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0x730, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000090}, 0x4008000) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) pipe2(&(0x7f0000000380), 0x800) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f00000003c0)={0x7fffffff, 0x63, 0x78, 0x0, 0x0, 0x4141}) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:31:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd403000000000000]}, 0x2c) 18:32:00 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 18:32:00 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x25000000]}, 0x2c) 18:32:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000300", @ifru_flags}) 18:32:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x14030000]}, 0x2c) 18:32:00 executing program 0: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:04 executing program 0: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00@\x00', @ifru_flags}) 18:32:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600003500020000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xe00]}, 0x2c) 18:32:04 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6e03000000000000]}, 0x2c) 18:32:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000200", @ifru_flags}) 18:32:04 executing program 0: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:04 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9000000]}, 0x2c) 18:32:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000300", @ifru_flags}) [ 1506.039465] IPVS: ftp: loaded support on port[0] = 21 [ 1506.141037] IPVS: ftp: loaded support on port[0] = 21 [ 1507.612468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1507.619341] bridge0: port 1(bridge_slave_0) entered disabled state [ 1507.626892] device bridge_slave_0 entered promiscuous mode [ 1507.684673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1507.691259] bridge0: port 2(bridge_slave_1) entered disabled state [ 1507.699217] device bridge_slave_1 entered promiscuous mode [ 1507.737395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1507.743837] bridge0: port 1(bridge_slave_0) entered disabled state [ 1507.751083] device bridge_slave_0 entered promiscuous mode [ 1507.770520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1507.814323] bridge0: port 2(bridge_slave_1) entered blocking state [ 1507.820792] bridge0: port 2(bridge_slave_1) entered disabled state [ 1507.828149] device bridge_slave_1 entered promiscuous mode [ 1507.836777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1507.875391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1507.963461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1508.131924] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1508.151969] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1508.184473] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1508.238224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1508.245136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1508.278366] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1508.295807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1508.302998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1508.394941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1508.418492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1508.477828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1508.484752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1508.506122] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1508.514258] team0: Port device team_slave_0 added [ 1508.581059] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1508.588692] team0: Port device team_slave_1 added [ 1508.665159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1508.695342] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1508.705168] team0: Port device team_slave_0 added [ 1508.721634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1508.751942] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1508.760507] team0: Port device team_slave_1 added [ 1508.772510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1508.780974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1508.798479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1508.810130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1509.353240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1509.360540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1509.368709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1509.378365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1509.394402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1509.402904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1509.683928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1509.693235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1509.702503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1509.998048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1510.005576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1510.022775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1511.879984] device bridge_slave_1 left promiscuous mode [ 1511.885536] bridge0: port 2(bridge_slave_1) entered disabled state [ 1511.928366] device bridge_slave_0 left promiscuous mode [ 1511.933816] bridge0: port 1(bridge_slave_0) entered disabled state [ 1511.979072] device bridge_slave_1 left promiscuous mode [ 1511.984526] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.038242] device bridge_slave_0 left promiscuous mode [ 1512.043704] bridge0: port 1(bridge_slave_0) entered disabled state [ 1516.694026] team0 (unregistering): Port device team_slave_1 removed [ 1516.704322] team0 (unregistering): Port device team_slave_0 removed [ 1516.716481] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1516.752049] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1516.838563] bond0 (unregistering): Released all slaves [ 1516.901769] team0 (unregistering): Port device team_slave_1 removed [ 1516.913306] team0 (unregistering): Port device team_slave_0 removed [ 1516.924226] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1516.992884] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1517.048570] bond0 (unregistering): Released all slaves [ 1517.179126] bridge0: port 2(bridge_slave_1) entered blocking state [ 1517.185510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1517.192338] bridge0: port 1(bridge_slave_0) entered blocking state [ 1517.198817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1517.206862] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1517.272964] bridge0: port 2(bridge_slave_1) entered blocking state [ 1517.279463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1517.286183] bridge0: port 1(bridge_slave_0) entered blocking state [ 1517.292626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1517.300241] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1518.138154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1518.155296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1520.092418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1520.118787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1520.268994] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1520.297100] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1520.445083] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1520.451368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1520.467479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1520.478156] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1520.484319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1520.500972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1520.644499] 8021q: adding VLAN 0 to HW filter on device team0 [ 1520.673826] 8021q: adding VLAN 0 to HW filter on device team0 18:32:20 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff7, 0x501800) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000340)={0x800, 0x0, 0x10001, 0x9741}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0186405, &(0x7f00000000c0)={0x8, 0x4, r1, 0x9, 0x0, 0xfffffffffffffff9, 0x0, 0x1}) ioprio_set$pid(0x2, r1, 0x4b7b) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r2, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x5000000]}, 0x2c) 18:32:20 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000300", @ifru_flags}) 18:32:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c460000000000000000a9617f1dfd59b5558db62d000000000300060000380000000000000000007af4c2d88eb97b14000009002000020000000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfc03]}, 0x2c) 18:32:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000200", @ifru_flags}) 18:32:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000700)="f6726f786e6590318d00", 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getgroups(0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xee01]) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0xee00, 0xee01]) setgroups(0x5, &(0x7f0000000440)=[r1, r2, r3, r4, 0x0]) write$binfmt_elf32(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000002000000000000000000000020000200000000008000000000000000000000000000000000000000000000000000000000000000000000000000ce7528352980785513950c5354e9329996223dc25f15dee3b910db24b3012a0195885cfa13a2cdaf1a3608b259d776d35b673f3a35e356dc7dbb43ba9c98be868b1f7b30fd62690211c08aa74f6dfe6389c8467c7f697d279f9b94fe23a94c37bf053e61d8aa615900561e468d704cb8274daa4896f83225ccc1398a4876d64d20fedbaf28cada8a84e2693d7aeb4f493a1e188fe2f0a2fcc94bcf33ae97687391ef5a236752fc84"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:20 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x500]}, 0x2c) 18:32:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, 0x0) 18:32:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000000000400", @ifru_flags}) 18:32:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020bea000020006000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, 0x0) 18:32:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1a010000]}, 0x2c) 18:32:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000300)) 18:32:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00\x00dirb\x00', @ifru_flags}) 18:32:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f4, 0x0) 18:32:21 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:21 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1402]}, 0x2c) 18:32:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x40, 0x4, 0x7}}, 0x14) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000fffe00", @ifru_flags}) 18:32:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, &(0x7f0000000c00)="a37f72345d1ca2338ecb027070d9838c97caf251c5a975d424849da5006fb6a727576349a3ddea7c2a99676c2047a0ee154e187fb6f99d67278e978308ca8bfbbd37a3b0e0eee62abc1f77c8cfb900922794cb9880b867f6dbbed3fb5cd58338f1bf4ddcdaf62a814b9f36485a49aa6dcd291655fcea93efae20d693a67acc7a9e4b1c4d8584236cc6e86f675e0a4ebb734bc9815b10fe034b9f9755e7b8") mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000240)={0x732, {0x6, 0x10000000000, 0x0, 0x2, 0x8}}) mount(&(0x7f0000000240), &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)='proc\x00', 0x0, &(0x7f0000000d40)='SET\x00') unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x7}, 0x8) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:32:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xd00]}, 0x2c) 18:32:21 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x394]}, 0x2c) 18:32:21 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x3f1) ioctl$VIDIOC_QBUF(r0, 0xc044560f, &(0x7f0000000040)={0xff, 0xf, 0x4, 0x200000, {0x0, 0x2710}, {0x4, 0x3, 0x80, 0x7, 0x80000001, 0x9, "69e8cf29"}, 0x401, 0x7, @offset=0x3, 0x4}) unshare(0x40000000) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000400", @ifru_flags}) 18:32:21 executing program 1: ioctl$sock_ifreq(0xffffffffffffffff, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:21 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x1fa]}, 0x2c) [ 1523.064113] IPVS: ftp: loaded support on port[0] = 21 18:32:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00brid\x00', @ifru_flags}) 18:32:21 executing program 1: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:21 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb403000000000000]}, 0x2c) [ 1523.401461] IPVS: ftp: loaded support on port[0] = 21 [ 1523.497106] IPVS: ftp: loaded support on port[0] = 21 18:32:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, &(0x7f0000000c00)="a37f72345d1ca2338ecb027070d9838c97caf251c5a975d424849da5006fb6a727576349a3ddea7c2a99676c2047a0ee154e187fb6f99d67278e978308ca8bfbbd37a3b0e0eee62abc1f77c8cfb900922794cb9880b867f6dbbed3fb5cd58338f1bf4ddcdaf62a814b9f36485a49aa6dcd291655fcea93efae20d693a67acc7a9e4b1c4d8584236cc6e86f675e0a4ebb734bc9815b10fe034b9f9755e7b8") mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000240)={0x732, {0x6, 0x10000000000, 0x0, 0x2, 0x8}}) mount(&(0x7f0000000240), &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)='proc\x00', 0x0, &(0x7f0000000d40)='SET\x00') unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x7}, 0x8) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) 18:32:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000000000000fffe00", @ifru_flags}) 18:32:22 executing program 1: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:22 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1524.342977] IPVS: ftp: loaded support on port[0] = 21 [ 1526.005114] [ 1526.006820] ==================================== [ 1526.011956] WARNING: syz-executor4/5778 still has locks held! [ 1526.018161] 4.20.0-rc5+ #265 Not tainted [ 1526.022295] ------------------------------------ [ 1526.027251] 1 lock held by syz-executor4/5778: [ 1526.031872] #0: 00000000e18427a0 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 1526.042766] [ 1526.042766] stack backtrace: [ 1526.047814] CPU: 0 PID: 5778 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #265 [ 1526.055082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.064420] Call Trace: [ 1526.067012] dump_stack+0x244/0x39d [ 1526.070629] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1526.075809] ? vprintk_func+0x85/0x181 [ 1526.079686] debug_check_no_locks_held.cold.49+0x93/0x9f [ 1526.085147] flush_old_exec+0x69e/0x2480 [ 1526.089197] ? mark_held_locks+0x43/0x130 [ 1526.093335] ? copy_strings_kernel+0x110/0x110 [ 1526.097901] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1526.102817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1526.107592] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1526.113027] ? retint_kernel+0x1b/0x2d [ 1526.116905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.122429] ? fsnotify+0x50e/0xef0 [ 1526.126057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1526.130812] ? fsnotify_first_mark+0x350/0x350 [ 1526.135379] ? __fsnotify_parent+0xcc/0x430 [ 1526.139690] ? fsnotify+0xef0/0xef0 [ 1526.143307] ? vfs_read+0x1ce/0x3c0 [ 1526.146920] ? kernel_read+0xab/0x120 [ 1526.150711] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1526.155713] ? load_elf_phdrs+0x1e4/0x270 [ 1526.159844] ? writenote+0x3d0/0x3d0 [ 1526.163546] ? __kasan_slab_free+0x119/0x150 [ 1526.167956] load_elf_binary+0xa9a/0x5cf0 [ 1526.172092] ? find_held_lock+0x36/0x1c0 [ 1526.176161] ? notesize.isra.6+0x80/0x80 [ 1526.180208] ? ima_file_mmap+0x160/0x160 [ 1526.184253] ? lock_downgrade+0x900/0x900 [ 1526.188413] ? kasan_check_write+0x14/0x20 [ 1526.192634] search_binary_handler+0x17d/0x570 [ 1526.197217] __do_execve_file.isra.33+0x1661/0x25d0 [ 1526.202229] ? prepare_bprm_creds+0x120/0x120 [ 1526.206714] ? usercopy_warn+0x110/0x110 [ 1526.210769] ? check_preemption_disabled+0x48/0x280 [ 1526.215794] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1526.221333] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1526.226855] ? strncpy_from_user+0x411/0x5a0 [ 1526.231253] ? digsig_verify+0x1530/0x1530 [ 1526.235477] ? kmem_cache_alloc+0x33a/0x730 [ 1526.239787] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1526.244355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.249880] __ia32_compat_sys_execveat+0xf3/0x140 [ 1526.254797] do_fast_syscall_32+0x34d/0xfb2 [ 1526.259104] ? do_int80_syscall_32+0x890/0x890 [ 1526.263669] ? entry_SYSENTER_compat+0x68/0x7f [ 1526.268237] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1526.273238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1526.278067] ? trace_hardirqs_on_caller+0x310/0x310 [ 1526.283069] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1526.288084] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1526.294736] ? __switch_to_asm+0x40/0x70 [ 1526.298781] ? __switch_to_asm+0x34/0x70 [ 1526.302831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1526.307660] entry_SYSENTER_compat+0x70/0x7f [ 1526.312052] RIP: 0023:0xf7f36a29 [ 1526.315406] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1526.334404] RSP: 002b:00000000f5f110cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1526.342099] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 1526.349382] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 18:32:25 executing program 1: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x88010000]}, 0x2c) 18:32:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"73697430000000000100", @ifru_flags}) 18:32:25 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000840)='/dev/admmidi#\x00', 0x3f, 0x200) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000880)={0x0, @bt={0xcce, 0x2, 0x0, 0x2, 0x10000, 0x3, 0x3ff, 0x0, 0x5, 0x4, 0x4, 0xcb3d, 0x1f, 0x513e, 0x8, 0x2}}) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000000000c300000000000008006ab2a8ef276b25758cd9fa13b2557544842a007f0ae6b69a1919069d575cb8a6ab9f145ae7506b00000000000000000000000000000000000000000000000000000000000000a7ca1a3e9f4e442a702f429a00000000"], 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) close(r0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000940)='trusted.overlay.redirect\x00', &(0x7f0000000980)='./file0\x00', 0x8, 0x3) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000007c0)={0x0, r1}) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000140)=@req={0x20, &(0x7f0000000100)={'bond_slave_1\x00', @ifru_names='veth0\x00'}}) execveat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)='vmnet1$cgroupcgroup\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='!cgroupmd5sum\x00', &(0x7f0000000380)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861"], &(0x7f0000000780)=[&(0x7f0000000480)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", &(0x7f0000000540)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", &(0x7f0000000600)='\x00', &(0x7f0000000640)='@\x00', &(0x7f0000000680)='\x00', &(0x7f00000006c0)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861"], 0xe70cf7ca4ab56bac) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/183) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 18:32:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, &(0x7f0000000c00)="a37f72345d1ca2338ecb027070d9838c97caf251c5a975d424849da5006fb6a727576349a3ddea7c2a99676c2047a0ee154e187fb6f99d67278e978308ca8bfbbd37a3b0e0eee62abc1f77c8cfb900922794cb9880b867f6dbbed3fb5cd58338f1bf4ddcdaf62a814b9f36485a49aa6dcd291655fcea93efae20d693a67acc7a9e4b1c4d8584236cc6e86f675e0a4ebb734bc9815b10fe034b9f9755e7b8") mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000240)={0x732, {0x6, 0x10000000000, 0x0, 0x2, 0x8}}) mount(&(0x7f0000000240), &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) mount(&(0x7f0000000540)=@md0='/dev/md0\x00', &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)='proc\x00', 0x0, &(0x7f0000000d40)='SET\x00') unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x7}, 0x8) openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000080)=0x54) [ 1526.356638] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1526.363891] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1526.371145] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1526.413741] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1526.425749] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' 18:32:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x46010000]}, 0x2c) 18:32:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000400", @ifru_flags}) [ 1526.455591] kobject: 'hci1' (00000000021e7ca8): kobject_add_internal: parent: 'bluetooth', set: 'devices' [ 1526.488135] kobject: 'loop5' (000000000e374401): kobject_uevent_env 18:32:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000760"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:25 executing program 1: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1526.497382] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1526.515550] kobject: 'hci1' (00000000021e7ca8): kobject_uevent_env [ 1526.552709] kobject: 'hci1' (00000000021e7ca8): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1' [ 1526.563059] IPVS: ftp: loaded support on port[0] = 21 [ 1526.587373] kobject: 'lo' (00000000a932e94c): kobject_add_internal: parent: 'net', set: 'devices' 18:32:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb202]}, 0x2c) [ 1526.597927] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env [ 1526.629060] kobject: 'lo' (00000000a932e94c): kobject_uevent_env [ 1526.652766] kobject: 'rfkill673' (00000000dfe9b1ce): kobject_add_internal: parent: 'hci1', set: 'devices' [ 1526.664007] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' 18:32:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000440)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2ecf25d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c70927cbdda271e47ef6f556a23a8ae0f06aa2fa8618916e1abf52f9a0a9ecb2e9591a9676c6281e6a6e03530bf28a71b3db1887ee5f36b17f5961dba2e0319777724ec86a2208eba540c159a203fd7a15b4f45cc", 0x2) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x2, 0x0, {0xa, 0x4e20, 0x100, @local, 0x7a8}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="a62e741aefa0cc287139dc790a6a7f964846a39a9438850ba9409525b91e5e22ab93e3241a597470f35c5da068515dbbf28d41b73a2d4db2447946a4e8217d6cb33e89d4", 0x44}], 0x1, 0x0, 0x0, 0x84}, 0x4044001) [ 1526.665238] kobject: 'lo' (00000000a932e94c): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1526.674416] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1526.689738] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1526.694022] kobject: 'rfkill673' (00000000dfe9b1ce): kobject_uevent_env [ 1526.704692] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1526.713789] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' 18:32:25 executing program 1: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x2, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000400)={0x0, 0x7530}, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-control\x00', 0x20004, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000080)=[0xbf4, 0x800]) recvfrom$unix(r1, &(0x7f0000000900)=""/4096, 0x1000, 0x2, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000004c0)=0x1) r2 = memfd_create(&(0x7f0000000240)='/dev/dlm-control\x00', 0x7) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0xe0, r3, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x924}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x400}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xc1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @broadcast}}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x101}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffcae}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4f7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x10}, 0x40004) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000440)=0x3) write$binfmt_elf32(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x58) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xfeffff0300000000]}, 0x2c) [ 1526.723075] kobject: 'rfkill673' (00000000dfe9b1ce): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1/rfkill673' [ 1526.733521] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1526.751032] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1526.805616] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1526.815968] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1526.841843] kobject: 'queues' (000000007726ec9d): kobject_add_internal: parent: 'lo', set: '' [ 1526.852340] kobject: 'rfkill673' (00000000dfe9b1ce): kobject_uevent_env [ 1526.863942] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1526.872222] kobject: 'rfkill673' (00000000dfe9b1ce): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1/rfkill673' [ 1526.884805] kobject: 'queues' (000000007726ec9d): kobject_uevent_env [ 1526.892287] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1526.899245] kobject: 'queues' (000000007726ec9d): kobject_uevent_env: filter function caused the event to drop! [ 1526.916217] kobject: 'rfkill673' (00000000dfe9b1ce): kobject_cleanup, parent (null) [ 1526.925797] kobject: 'rfkill673' (00000000dfe9b1ce): calling ktype release [ 1526.934728] kobject: 'rx-0' (00000000a1ab7c29): kobject_add_internal: parent: 'queues', set: 'queues' [ 1526.944984] kobject: 'rfkill673': free name [ 1526.951127] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1526.960139] kobject: 'hci1' (00000000021e7ca8): kobject_uevent_env [ 1526.966819] kobject: 'rx-0' (00000000a1ab7c29): kobject_uevent_env [ 1526.974403] kobject: 'hci1' (00000000021e7ca8): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1' [ 1526.989514] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1527.000675] kobject: 'rx-0' (00000000a1ab7c29): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1527.012895] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1527.023019] kobject: 'hci1' (00000000021e7ca8): kobject_cleanup, parent (null) [ 1527.032426] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1527.042982] kobject: 'tx-0' (000000003b3983f0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1527.047650] kobject: 'hci1' (00000000021e7ca8): calling ktype release [ 1527.069016] kobject: 'tx-0' (000000003b3983f0): kobject_uevent_env [ 1527.078199] kobject: 'hci1': free name [ 1527.080457] kobject: 'tx-0' (000000003b3983f0): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' 18:32:25 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:25 executing program 1: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1527.127906] kobject: 'tunl0' (00000000c3dc591c): kobject_add_internal: parent: 'net', set: 'devices' [ 1527.147300] kobject: 'loop2' (000000001af22e88): kobject_uevent_env [ 1527.153760] kobject: 'loop2' (000000001af22e88): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1527.218112] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env [ 1527.224593] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1527.242096] kobject: 'tunl0' (00000000c3dc591c): kobject_uevent_env [ 1527.251336] kobject: 'hci1' (00000000d25702a9): kobject_add_internal: parent: 'bluetooth', set: 'devices' [ 1527.286328] kobject: 'tunl0' (00000000c3dc591c): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1527.303312] kobject: 'hci1' (00000000d25702a9): kobject_uevent_env [ 1527.323104] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1527.341101] kobject: 'hci1' (00000000d25702a9): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1' [ 1527.351354] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1527.363574] kobject: 'queues' (00000000508d7107): kobject_add_internal: parent: 'tunl0', set: '' [ 1527.388020] kobject: 'rfkill674' (00000000913c45ef): kobject_add_internal: parent: 'hci1', set: 'devices' [ 1527.406826] kobject: 'queues' (00000000508d7107): kobject_uevent_env [ 1527.424395] kobject: 'rfkill674' (00000000913c45ef): kobject_uevent_env [ 1527.431947] kobject: 'queues' (00000000508d7107): kobject_uevent_env: filter function caused the event to drop! [ 1527.443047] kobject: 'rfkill674' (00000000913c45ef): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1/rfkill674' [ 1527.464250] kobject: 'rfkill674' (00000000913c45ef): kobject_uevent_env [ 1527.472094] kobject: 'rx-0' (00000000072810f6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1527.482526] kobject: 'rfkill674' (00000000913c45ef): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1/rfkill674' [ 1527.494099] kobject: 'rx-0' (00000000072810f6): kobject_uevent_env [ 1527.501177] kobject: 'rx-0' (00000000072810f6): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1527.515215] kobject: 'rfkill674' (00000000913c45ef): kobject_cleanup, parent (null) [ 1527.524586] kobject: 'rfkill674' (00000000913c45ef): calling ktype release [ 1527.532100] kobject: 'rfkill674': free name [ 1527.537530] kobject: 'tx-0' (000000001e36aca5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1527.547569] kobject: 'tx-0' (000000001e36aca5): kobject_uevent_env [ 1527.553934] kobject: 'tx-0' (000000001e36aca5): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1527.566216] kobject: 'hci1' (00000000d25702a9): kobject_uevent_env [ 1527.573418] kobject: 'hci1' (00000000d25702a9): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1' [ 1527.587456] kobject: 'hci1' (00000000d25702a9): kobject_cleanup, parent (null) [ 1527.595911] kobject: 'hci1' (00000000d25702a9): calling ktype release [ 1527.604718] kobject: 'gre0' (0000000020a1ea09): kobject_add_internal: parent: 'net', set: 'devices' [ 1527.614512] kobject: 'hci1': free name [ 1527.673239] kobject: 'gre0' (0000000020a1ea09): kobject_uevent_env [ 1527.707626] kobject: 'gre0' (0000000020a1ea09): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1527.716985] kobject: 'queues' (000000001debadda): kobject_add_internal: parent: 'gre0', set: '' [ 1527.726599] kobject: 'queues' (000000001debadda): kobject_uevent_env [ 1527.733248] kobject: 'queues' (000000001debadda): kobject_uevent_env: filter function caused the event to drop! [ 1527.743638] kobject: 'rx-0' (00000000e36ee56e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1527.753227] kobject: 'rx-0' (00000000e36ee56e): kobject_uevent_env [ 1527.759706] kobject: 'rx-0' (00000000e36ee56e): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1527.770084] kobject: 'tx-0' (00000000fd77489d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1527.781017] kobject: 'tx-0' (00000000fd77489d): kobject_uevent_env [ 1527.806904] kobject: 'tx-0' (00000000fd77489d): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1527.835880] kobject: 'loop2' (000000001af22e88): kobject_uevent_env [ 1527.845131] kobject: 'loop2' (000000001af22e88): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1527.845942] kobject: 'rx-0' (00000000093346a6): kobject_cleanup, parent 000000008fb4bf6e [ 1527.863865] kobject: 'rx-0' (00000000093346a6): auto cleanup 'remove' event [ 1527.871101] kobject: 'rx-0' (00000000093346a6): kobject_uevent_env [ 1527.877724] kobject: 'rx-0' (00000000093346a6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1527.888080] kobject: 'rx-0' (00000000093346a6): auto cleanup kobject_del [ 1527.895016] kobject: 'rx-0' (00000000093346a6): calling ktype release [ 1527.901735] kobject: 'rx-0': free name [ 1527.905746] kobject: 'tx-0' (0000000026752637): kobject_cleanup, parent 000000008fb4bf6e [ 1527.914180] kobject: 'tx-0' (0000000026752637): auto cleanup 'remove' event [ 1527.921394] kobject: 'tx-0' (0000000026752637): kobject_uevent_env [ 1527.927817] kobject: 'tx-0' (0000000026752637): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1527.937963] kobject: 'tx-0' (0000000026752637): auto cleanup kobject_del [ 1527.944908] kobject: 'tx-0' (0000000026752637): calling ktype release [ 1527.951585] kobject: 'tx-0': free name [ 1527.955560] kobject: 'queues' (000000008fb4bf6e): kobject_cleanup, parent (null) [ 1527.964128] kobject: 'queues' (000000008fb4bf6e): calling ktype release [ 1527.970983] kobject: 'queues' (000000008fb4bf6e): kset_release [ 1527.977021] kobject: 'queues': free name [ 1527.981709] kobject: 'ip6gre0' (000000008398e95e): kobject_uevent_env [ 1527.988440] kobject: 'ip6gre0' (000000008398e95e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1527.999916] kobject: 'rx-0' (0000000073051375): kobject_cleanup, parent 0000000028f5ce87 [ 1528.008286] kobject: 'rx-0' (0000000073051375): auto cleanup 'remove' event [ 1528.015453] kobject: 'rx-0' (0000000073051375): kobject_uevent_env [ 1528.021983] kobject: 'rx-0' (0000000073051375): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.032155] kobject: 'rx-0' (0000000073051375): auto cleanup kobject_del [ 1528.039288] kobject: 'rx-0' (0000000073051375): calling ktype release [ 1528.045931] kobject: 'rx-0': free name [ 1528.049959] kobject: 'tx-0' (00000000cdd10eb6): kobject_cleanup, parent 0000000028f5ce87 [ 1528.058285] kobject: 'tx-0' (00000000cdd10eb6): auto cleanup 'remove' event [ 1528.065449] kobject: 'tx-0' (00000000cdd10eb6): kobject_uevent_env [ 1528.071863] kobject: 'tx-0' (00000000cdd10eb6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.082053] kobject: 'tx-0' (00000000cdd10eb6): auto cleanup kobject_del [ 1528.089035] kobject: 'tx-0' (00000000cdd10eb6): calling ktype release [ 1528.095680] kobject: 'tx-0': free name [ 1528.099691] kobject: 'queues' (0000000028f5ce87): kobject_cleanup, parent (null) [ 1528.108186] kobject: 'queues' (0000000028f5ce87): calling ktype release [ 1528.115005] kobject: 'queues' (0000000028f5ce87): kset_release [ 1528.121109] kobject: 'queues': free name [ 1528.125660] kobject: 'ip6gre0' (000000005217d41c): kobject_uevent_env [ 1528.132361] kobject: 'ip6gre0' (000000005217d41c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.142971] kobject: 'ip6gre0' (000000008398e95e): kobject_cleanup, parent (null) [ 1528.143182] kobject: 'gretap0' (000000000c557712): kobject_add_internal: parent: 'net', set: 'devices' [ 1528.151558] kobject: 'ip6gre0' (000000008398e95e): auto cleanup 'remove' event [ 1528.168395] kobject: 'ip6gre0' (000000008398e95e): kobject_uevent_env [ 1528.175061] kobject: 'ip6gre0' (000000008398e95e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.185500] kobject: 'ip6gre0' (000000008398e95e): calling ktype release [ 1528.193481] kobject: 'gretap0' (000000000c557712): kobject_uevent_env [ 1528.200220] kobject: 'ip6gre0': free name [ 1528.204553] kobject: 'gretap0' (000000000c557712): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1528.214425] kobject: 'queues' (00000000ec907156): kobject_add_internal: parent: 'gretap0', set: '' [ 1528.224182] kobject: 'queues' (00000000ec907156): kobject_uevent_env [ 1528.230808] kobject: 'queues' (00000000ec907156): kobject_uevent_env: filter function caused the event to drop! [ 1528.241189] kobject: 'rx-0' (00000000298aa73d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1528.250818] kobject: 'rx-0' (00000000298aa73d): kobject_uevent_env [ 1528.257396] kobject: 'rx-0' (00000000298aa73d): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1528.268013] kobject: 'tx-0' (00000000d5102062): kobject_add_internal: parent: 'queues', set: 'queues' [ 1528.277674] kobject: 'tx-0' (00000000d5102062): kobject_uevent_env [ 1528.284100] kobject: 'tx-0' (00000000d5102062): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1528.295718] kobject: 'ip6gre0' (000000005217d41c): kobject_cleanup, parent (null) [ 1528.304532] kobject: 'erspan0' (000000001d36edf6): kobject_add_internal: parent: 'net', set: 'devices' [ 1528.314046] kobject: 'ip6gre0' (000000005217d41c): auto cleanup 'remove' event [ 1528.321528] kobject: 'ip6gre0' (000000005217d41c): kobject_uevent_env [ 1528.328173] kobject: 'ip6gre0' (000000005217d41c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.339556] kobject: 'erspan0' (000000001d36edf6): kobject_uevent_env [ 1528.346174] kobject: 'ip6gre0' (000000005217d41c): calling ktype release [ 1528.353249] kobject: 'ip6gre0': free name [ 1528.357538] kobject: 'erspan0' (000000001d36edf6): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1528.367383] kobject: 'queues' (00000000a56efd8e): kobject_add_internal: parent: 'erspan0', set: '' [ 1528.377108] kobject: 'queues' (00000000a56efd8e): kobject_uevent_env [ 1528.383824] kobject: 'queues' (00000000a56efd8e): kobject_uevent_env: filter function caused the event to drop! [ 1528.394169] kobject: 'rx-0' (0000000073f07e82): kobject_add_internal: parent: 'queues', set: 'queues' [ 1528.404910] kobject: 'rx-0' (0000000073f07e82): kobject_uevent_env [ 1528.414644] kobject: 'rx-0' (0000000073f07e82): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1528.426432] kobject: 'tx-0' (0000000098af53ff): kobject_add_internal: parent: 'queues', set: 'queues' [ 1528.436354] kobject: 'tx-0' (0000000098af53ff): kobject_uevent_env [ 1528.443081] kobject: 'tx-0' (0000000098af53ff): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1528.455934] kobject: 'ip_vti0' (0000000061a88667): kobject_add_internal: parent: 'net', set: 'devices' [ 1528.466742] kobject: 'ip_vti0' (0000000061a88667): kobject_uevent_env [ 1528.473647] kobject: 'ip_vti0' (0000000061a88667): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1528.483744] kobject: 'queues' (000000005dfda3cc): kobject_add_internal: parent: 'ip_vti0', set: '' [ 1528.494248] kobject: 'queues' (000000005dfda3cc): kobject_uevent_env [ 1528.501057] kobject: 'queues' (000000005dfda3cc): kobject_uevent_env: filter function caused the event to drop! [ 1528.511758] kobject: 'rx-0' (000000003a320ff1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1528.521474] kobject: 'rx-0' (000000003a320ff1): kobject_uevent_env [ 1528.528105] kobject: 'rx-0' (000000003a320ff1): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1528.538996] kobject: 'tx-0' (000000009dae1b43): kobject_add_internal: parent: 'queues', set: 'queues' [ 1528.548845] kobject: 'tx-0' (000000009dae1b43): kobject_uevent_env [ 1528.555276] kobject: 'tx-0' (000000009dae1b43): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1528.567602] kobject: 'rx-0' (00000000451c7dd7): kobject_cleanup, parent 000000004008fc86 [ 1528.575852] kobject: 'rx-0' (00000000451c7dd7): auto cleanup 'remove' event [ 1528.583001] kobject: 'rx-0' (00000000451c7dd7): kobject_uevent_env [ 1528.589407] kobject: 'rx-0' (00000000451c7dd7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.599524] kobject: 'rx-0' (00000000451c7dd7): auto cleanup kobject_del [ 1528.606402] kobject: 'rx-0' (00000000451c7dd7): calling ktype release [ 1528.613071] kobject: 'rx-0': free name [ 1528.617071] kobject: 'tx-0' (00000000d024c741): kobject_cleanup, parent 000000004008fc86 [ 1528.625453] kobject: 'tx-0' (00000000d024c741): auto cleanup 'remove' event [ 1528.632629] kobject: 'tx-0' (00000000d024c741): kobject_uevent_env [ 1528.639075] kobject: 'tx-0' (00000000d024c741): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.649165] kobject: 'tx-0' (00000000d024c741): auto cleanup kobject_del [ 1528.656056] kobject: 'tx-0' (00000000d024c741): calling ktype release [ 1528.662688] kobject: 'tx-0': free name [ 1528.666597] kobject: 'queues' (000000004008fc86): kobject_cleanup, parent (null) [ 1528.675035] kobject: 'queues' (000000004008fc86): calling ktype release [ 1528.681914] kobject: 'queues' (000000004008fc86): kset_release [ 1528.687948] kobject: 'queues': free name [ 1528.692277] kobject: 'ip6tnl0' (000000000569f637): kobject_uevent_env [ 1528.698954] kobject: 'ip6tnl0' (000000000569f637): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.709944] kobject: 'rx-0' (00000000a2481a81): kobject_cleanup, parent 000000001d5122c9 [ 1528.718223] kobject: 'rx-0' (00000000a2481a81): auto cleanup 'remove' event [ 1528.725357] kobject: 'rx-0' (00000000a2481a81): kobject_uevent_env [ 1528.731792] kobject: 'rx-0' (00000000a2481a81): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.742092] kobject: 'rx-0' (00000000a2481a81): auto cleanup kobject_del [ 1528.749249] kobject: 'rx-0' (00000000a2481a81): calling ktype release [ 1528.755913] kobject: 'rx-0': free name [ 1528.759995] kobject: 'tx-0' (00000000935ba35d): kobject_cleanup, parent 000000001d5122c9 [ 1528.768300] kobject: 'tx-0' (00000000935ba35d): auto cleanup 'remove' event [ 1528.775416] kobject: 'tx-0' (00000000935ba35d): kobject_uevent_env [ 1528.781788] kobject: 'tx-0' (00000000935ba35d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.791884] kobject: 'tx-0' (00000000935ba35d): auto cleanup kobject_del [ 1528.798858] kobject: 'tx-0' (00000000935ba35d): calling ktype release [ 1528.805438] kobject: 'tx-0': free name [ 1528.809432] kobject: 'queues' (000000001d5122c9): kobject_cleanup, parent (null) [ 1528.817879] kobject: 'queues' (000000001d5122c9): calling ktype release [ 1528.824620] kobject: 'queues' (000000001d5122c9): kset_release [ 1528.830621] kobject: 'queues': free name [ 1528.834986] kobject: 'ip6tnl0' (00000000c9ab00b7): kobject_uevent_env [ 1528.841637] kobject: 'ip6tnl0' (00000000c9ab00b7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1528.852584] kobject: 'rx-0' (000000003a320ff1): kobject_cleanup, parent 000000005dfda3cc [ 1528.860980] kobject: 'rx-0' (000000003a320ff1): auto cleanup 'remove' event [ 1528.868138] kobject: 'rx-0' (000000003a320ff1): kobject_uevent_env [ 1528.874522] kobject: 'rx-0' (000000003a320ff1): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1528.885461] kobject: 'rx-0' (000000003a320ff1): auto cleanup kobject_del [ 1528.892427] kobject: 'rx-0' (000000003a320ff1): calling ktype release [ 1528.899111] kobject: 'rx-0': free name [ 1528.903034] kobject: 'tx-0' (000000009dae1b43): kobject_cleanup, parent 000000005dfda3cc [ 1528.911330] kobject: 'tx-0' (000000009dae1b43): auto cleanup 'remove' event [ 1528.918454] kobject: 'tx-0' (000000009dae1b43): kobject_uevent_env [ 1528.924783] kobject: 'tx-0' (000000009dae1b43): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1528.935301] kobject: 'tx-0' (000000009dae1b43): auto cleanup kobject_del [ 1528.942400] kobject: 'tx-0' (000000009dae1b43): calling ktype release [ 1528.949039] kobject: 'tx-0': free name [ 1528.952956] kobject: 'queues' (000000005dfda3cc): kobject_cleanup, parent (null) [ 1528.961384] kobject: 'queues' (000000005dfda3cc): calling ktype release [ 1528.968225] kobject: 'queues' (000000005dfda3cc): kset_release [ 1528.974186] kobject: 'queues': free name [ 1528.978654] kobject: 'ip_vti0' (0000000061a88667): kobject_uevent_env [ 1528.985249] kobject: 'ip_vti0' (0000000061a88667): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1528.995157] kobject: 'ip6tnl0' (000000000569f637): kobject_cleanup, parent (null) [ 1529.003730] kobject: 'ip6tnl0' (000000000569f637): auto cleanup 'remove' event [ 1529.011480] kobject: 'ip6tnl0' (000000000569f637): kobject_uevent_env [ 1529.018167] kobject: 'ip6tnl0' (000000000569f637): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.028617] kobject: 'ip_vti0' (0000000061a88667): kobject_cleanup, parent (null) [ 1529.029101] kobject: 'ip6tnl0' (000000000569f637): calling ktype release [ 1529.037127] kobject: 'ip_vti0' (0000000061a88667): calling ktype release [ 1529.037231] kobject: 'ip_vti0': free name [ 1529.044450] kobject: 'ip6tnl0': free name [ 1529.060060] kobject: 'rx-0' (0000000073f07e82): kobject_cleanup, parent 00000000a56efd8e [ 1529.068361] kobject: 'rx-0' (0000000073f07e82): auto cleanup 'remove' event [ 1529.075460] kobject: 'rx-0' (0000000073f07e82): kobject_uevent_env [ 1529.081844] kobject: 'rx-0' (0000000073f07e82): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1529.092326] kobject: 'rx-0' (0000000073f07e82): auto cleanup kobject_del [ 1529.099221] kobject: 'rx-0' (0000000073f07e82): calling ktype release [ 1529.105795] kobject: 'rx-0': free name [ 1529.109779] kobject: 'tx-0' (0000000098af53ff): kobject_cleanup, parent 00000000a56efd8e [ 1529.118058] kobject: 'tx-0' (0000000098af53ff): auto cleanup 'remove' event [ 1529.125160] kobject: 'tx-0' (0000000098af53ff): kobject_uevent_env [ 1529.131563] kobject: 'tx-0' (0000000098af53ff): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1529.142385] kobject: 'tx-0' (0000000098af53ff): auto cleanup kobject_del [ 1529.149375] kobject: 'tx-0' (0000000098af53ff): calling ktype release [ 1529.155954] kobject: 'tx-0': free name [ 1529.160059] kobject: 'queues' (00000000a56efd8e): kobject_cleanup, parent (null) [ 1529.168510] kobject: 'queues' (00000000a56efd8e): calling ktype release [ 1529.175282] kobject: 'queues' (00000000a56efd8e): kset_release [ 1529.181291] kobject: 'queues': free name [ 1529.185617] kobject: 'erspan0' (000000001d36edf6): kobject_uevent_env [ 1529.192278] kobject: 'erspan0' (000000001d36edf6): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1529.202087] kobject: 'ip6tnl0' (00000000c9ab00b7): kobject_cleanup, parent (null) [ 1529.210629] kobject: 'ip6tnl0' (00000000c9ab00b7): auto cleanup 'remove' event [ 1529.218092] kobject: 'ip6tnl0' (00000000c9ab00b7): kobject_uevent_env [ 1529.224671] kobject: 'ip6tnl0' (00000000c9ab00b7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.227346] kobject: 'erspan0' (000000001d36edf6): kobject_cleanup, parent (null) [ 1529.235017] kobject: 'ip6tnl0' (00000000c9ab00b7): calling ktype release [ 1529.243965] kobject: 'erspan0' (000000001d36edf6): calling ktype release [ 1529.250361] kobject: 'ip6tnl0': free name [ 1529.257601] kobject: 'erspan0': free name [ 1529.266428] kobject: 'rx-0' (0000000046b3294c): kobject_cleanup, parent 00000000b38e8c2c [ 1529.274721] kobject: 'rx-0' (0000000046b3294c): auto cleanup 'remove' event [ 1529.281879] kobject: 'rx-0' (0000000046b3294c): kobject_uevent_env [ 1529.288233] kobject: 'rx-0' (0000000046b3294c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.298420] kobject: 'rx-0' (0000000046b3294c): auto cleanup kobject_del [ 1529.305282] kobject: 'rx-0' (0000000046b3294c): calling ktype release [ 1529.311898] kobject: 'rx-0': free name [ 1529.315820] kobject: 'tx-0' (00000000b2a2ef13): kobject_cleanup, parent 00000000b38e8c2c [ 1529.324079] kobject: 'tx-0' (00000000b2a2ef13): auto cleanup 'remove' event [ 1529.331199] kobject: 'tx-0' (00000000b2a2ef13): kobject_uevent_env [ 1529.337613] kobject: 'tx-0' (00000000b2a2ef13): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.349066] kobject: 'tx-0' (00000000b2a2ef13): auto cleanup kobject_del [ 1529.356148] kobject: 'tx-0' (00000000b2a2ef13): calling ktype release [ 1529.362960] kobject: 'tx-0': free name [ 1529.366862] kobject: 'queues' (00000000b38e8c2c): kobject_cleanup, parent (null) [ 1529.375305] kobject: 'queues' (00000000b38e8c2c): calling ktype release [ 1529.382094] kobject: 'queues' (00000000b38e8c2c): kset_release [ 1529.388094] kobject: 'queues': free name [ 1529.392406] kobject: 'sit0' (000000009a20fb37): kobject_uevent_env [ 1529.399154] kobject: 'sit0' (000000009a20fb37): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.409948] kobject: 'rx-0' (000000007bcfb536): kobject_cleanup, parent 00000000a39136a4 [ 1529.418293] kobject: 'rx-0' (000000007bcfb536): auto cleanup 'remove' event [ 1529.425383] kobject: 'rx-0' (000000007bcfb536): kobject_uevent_env [ 1529.431741] kobject: 'rx-0' (000000007bcfb536): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.441839] kobject: 'rx-0' (000000007bcfb536): auto cleanup kobject_del [ 1529.448731] kobject: 'rx-0' (000000007bcfb536): calling ktype release [ 1529.455307] kobject: 'rx-0': free name [ 1529.459278] kobject: 'tx-0' (00000000641ffb06): kobject_cleanup, parent 00000000a39136a4 [ 1529.467534] kobject: 'tx-0' (00000000641ffb06): auto cleanup 'remove' event [ 1529.474627] kobject: 'tx-0' (00000000641ffb06): kobject_uevent_env [ 1529.480979] kobject: 'tx-0' (00000000641ffb06): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.491081] kobject: 'tx-0' (00000000641ffb06): auto cleanup kobject_del [ 1529.498734] kobject: 'tx-0' (00000000641ffb06): calling ktype release [ 1529.505306] kobject: 'tx-0': free name [ 1529.509260] kobject: 'queues' (00000000a39136a4): kobject_cleanup, parent (null) [ 1529.517781] kobject: 'queues' (00000000a39136a4): calling ktype release [ 1529.524523] kobject: 'queues' (00000000a39136a4): kset_release [ 1529.530978] kobject: 'queues': free name [ 1529.535313] kobject: 'sit0' (000000008f99ea58): kobject_uevent_env [ 1529.541697] kobject: 'sit0' (000000008f99ea58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.552661] kobject: 'rx-0' (00000000298aa73d): kobject_cleanup, parent 00000000ec907156 [ 1529.560955] kobject: 'rx-0' (00000000298aa73d): auto cleanup 'remove' event [ 1529.568100] kobject: 'rx-0' (00000000298aa73d): kobject_uevent_env [ 1529.574454] kobject: 'rx-0' (00000000298aa73d): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1529.585336] kobject: 'rx-0' (00000000298aa73d): auto cleanup kobject_del [ 1529.592293] kobject: 'rx-0' (00000000298aa73d): calling ktype release [ 1529.599079] kobject: 'rx-0': free name [ 1529.602999] kobject: 'tx-0' (00000000d5102062): kobject_cleanup, parent 00000000ec907156 [ 1529.611253] kobject: 'tx-0' (00000000d5102062): auto cleanup 'remove' event [ 1529.618393] kobject: 'tx-0' (00000000d5102062): kobject_uevent_env [ 1529.624727] kobject: 'tx-0' (00000000d5102062): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1529.635236] kobject: 'tx-0' (00000000d5102062): auto cleanup kobject_del [ 1529.642230] kobject: 'tx-0' (00000000d5102062): calling ktype release [ 1529.648859] kobject: 'tx-0': free name [ 1529.652766] kobject: 'queues' (00000000ec907156): kobject_cleanup, parent (null) [ 1529.661285] kobject: 'queues' (00000000ec907156): calling ktype release [ 1529.668101] kobject: 'queues' (00000000ec907156): kset_release [ 1529.674083] kobject: 'queues': free name [ 1529.678576] kobject: 'gretap0' (000000000c557712): kobject_uevent_env [ 1529.685186] kobject: 'gretap0' (000000000c557712): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1529.695125] kobject: 'sit0' (000000009a20fb37): kobject_cleanup, parent (null) [ 1529.703433] kobject: 'sit0' (000000009a20fb37): auto cleanup 'remove' event [ 1529.710585] kobject: 'sit0' (000000009a20fb37): kobject_uevent_env [ 1529.716904] kobject: 'sit0' (000000009a20fb37): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.727102] kobject: 'gretap0' (000000000c557712): kobject_cleanup, parent (null) [ 1529.727789] kobject: 'sit0' (000000009a20fb37): calling ktype release [ 1529.735647] kobject: 'gretap0' (000000000c557712): calling ktype release [ 1529.742640] kobject: 'sit0': free name [ 1529.749183] kobject: 'gretap0': free name [ 1529.753326] kobject: 'sit0' (000000008f99ea58): kobject_cleanup, parent (null) [ 1529.765471] kobject: 'sit0' (000000008f99ea58): auto cleanup 'remove' event [ 1529.772656] kobject: 'sit0' (000000008f99ea58): kobject_uevent_env [ 1529.779047] kobject: 'sit0' (000000008f99ea58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.779645] kobject: 'rx-0' (00000000e36ee56e): kobject_cleanup, parent 000000001debadda [ 1529.789684] kobject: 'sit0' (000000008f99ea58): calling ktype release [ 1529.797965] kobject: 'rx-0' (00000000e36ee56e): auto cleanup 'remove' event [ 1529.804008] kobject: 'sit0': free name [ 1529.815113] kobject: 'rx-0' (00000000e36ee56e): kobject_uevent_env [ 1529.821574] kobject: 'rx-0' (00000000e36ee56e): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1529.831831] kobject: 'rx-0' (00000000e36ee56e): auto cleanup kobject_del [ 1529.838751] kobject: 'rx-0' (00000000e36ee56e): calling ktype release [ 1529.845346] kobject: 'rx-0': free name [ 1529.849325] kobject: 'tx-0' (00000000fd77489d): kobject_cleanup, parent 000000001debadda [ 1529.857600] kobject: 'tx-0' (00000000fd77489d): auto cleanup 'remove' event [ 1529.864711] kobject: 'tx-0' (00000000fd77489d): kobject_uevent_env [ 1529.871192] kobject: 'tx-0' (00000000fd77489d): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1529.881403] kobject: 'tx-0' (00000000fd77489d): auto cleanup kobject_del [ 1529.888322] kobject: 'tx-0' (00000000fd77489d): calling ktype release [ 1529.894897] kobject: 'tx-0': free name [ 1529.898935] kobject: 'queues' (000000001debadda): kobject_cleanup, parent (null) [ 1529.907408] kobject: 'queues' (000000001debadda): calling ktype release [ 1529.914170] kobject: 'queues' (000000001debadda): kset_release [ 1529.920624] kobject: 'queues': free name [ 1529.924960] kobject: 'gre0' (0000000020a1ea09): kobject_uevent_env [ 1529.931358] kobject: 'gre0' (0000000020a1ea09): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1529.941359] kobject: 'rx-0' (000000001d0d3feb): kobject_cleanup, parent 000000006272b597 [ 1529.949662] kobject: 'rx-0' (000000001d0d3feb): auto cleanup 'remove' event [ 1529.956748] kobject: 'rx-0' (000000001d0d3feb): kobject_uevent_env [ 1529.963121] kobject: 'rx-0' (000000001d0d3feb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1529.973217] kobject: 'rx-0' (000000001d0d3feb): auto cleanup kobject_del [ 1529.980137] kobject: 'rx-0' (000000001d0d3feb): calling ktype release [ 1529.986771] kobject: 'rx-0': free name [ 1529.990736] kobject: 'tx-0' (00000000f42f70df): kobject_cleanup, parent 000000006272b597 [ 1529.998988] kobject: 'tx-0' (00000000f42f70df): auto cleanup 'remove' event [ 1530.006071] kobject: 'tx-0' (00000000f42f70df): kobject_uevent_env [ 1530.012460] kobject: 'tx-0' (00000000f42f70df): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.022546] kobject: 'tx-0' (00000000f42f70df): auto cleanup kobject_del [ 1530.029571] kobject: 'tx-0' (00000000f42f70df): calling ktype release [ 1530.036150] kobject: 'tx-0': free name [ 1530.040085] kobject: 'queues' (000000006272b597): kobject_cleanup, parent (null) [ 1530.048524] kobject: 'queues' (000000006272b597): calling ktype release [ 1530.055277] kobject: 'queues' (000000006272b597): kset_release [ 1530.061281] kobject: 'queues': free name [ 1530.065603] kobject: 'ip6_vti0' (00000000056990ae): kobject_uevent_env [ 1530.072380] kobject: 'ip6_vti0' (00000000056990ae): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.083436] kobject: 'rx-0' (000000000d590c88): kobject_cleanup, parent 00000000422f8582 [ 1530.091689] kobject: 'rx-0' (000000000d590c88): auto cleanup 'remove' event [ 1530.098843] kobject: 'rx-0' (000000000d590c88): kobject_uevent_env [ 1530.105169] kobject: 'rx-0' (000000000d590c88): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.115245] kobject: 'rx-0' (000000000d590c88): auto cleanup kobject_del [ 1530.122135] kobject: 'rx-0' (000000000d590c88): calling ktype release [ 1530.128741] kobject: 'rx-0': free name [ 1530.132665] kobject: 'tx-0' (000000007b4650b8): kobject_cleanup, parent 00000000422f8582 [ 1530.140917] kobject: 'tx-0' (000000007b4650b8): auto cleanup 'remove' event [ 1530.148036] kobject: 'tx-0' (000000007b4650b8): kobject_uevent_env [ 1530.154345] kobject: 'tx-0' (000000007b4650b8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.164418] kobject: 'tx-0' (000000007b4650b8): auto cleanup kobject_del [ 1530.171309] kobject: 'tx-0' (000000007b4650b8): calling ktype release [ 1530.177908] kobject: 'tx-0': free name [ 1530.181808] kobject: 'queues' (00000000422f8582): kobject_cleanup, parent (null) [ 1530.190229] kobject: 'queues' (00000000422f8582): calling ktype release [ 1530.196986] kobject: 'queues' (00000000422f8582): kset_release [ 1530.202979] kobject: 'queues': free name [ 1530.207421] kobject: 'ip6_vti0' (00000000325c5213): kobject_uevent_env [ 1530.214077] kobject: 'ip6_vti0' (00000000325c5213): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.225112] kobject: 'gre0' (0000000020a1ea09): kobject_cleanup, parent (null) [ 1530.233487] kobject: 'gre0' (0000000020a1ea09): calling ktype release [ 1530.240123] kobject: 'gre0': free name [ 1530.244447] kobject: 'rx-0' (00000000072810f6): kobject_cleanup, parent 00000000508d7107 [ 1530.252743] kobject: 'rx-0' (00000000072810f6): auto cleanup 'remove' event [ 1530.259859] kobject: 'rx-0' (00000000072810f6): kobject_uevent_env [ 1530.266187] kobject: 'rx-0' (00000000072810f6): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1530.276513] kobject: 'rx-0' (00000000072810f6): auto cleanup kobject_del [ 1530.283414] kobject: 'rx-0' (00000000072810f6): calling ktype release [ 1530.290015] kobject: 'rx-0': free name [ 1530.293942] kobject: 'tx-0' (000000001e36aca5): kobject_cleanup, parent 00000000508d7107 [ 1530.302255] kobject: 'tx-0' (000000001e36aca5): auto cleanup 'remove' event [ 1530.309695] kobject: 'tx-0' (000000001e36aca5): kobject_uevent_env [ 1530.316044] kobject: 'tx-0' (000000001e36aca5): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1530.326397] kobject: 'tx-0' (000000001e36aca5): auto cleanup kobject_del [ 1530.333315] kobject: 'tx-0' (000000001e36aca5): calling ktype release [ 1530.339914] kobject: 'tx-0': free name [ 1530.343816] kobject: 'queues' (00000000508d7107): kobject_cleanup, parent (null) [ 1530.352241] kobject: 'queues' (00000000508d7107): calling ktype release [ 1530.359027] kobject: 'queues' (00000000508d7107): kset_release [ 1530.364984] kobject: 'queues': free name [ 1530.369425] kobject: 'tunl0' (00000000c3dc591c): kobject_uevent_env [ 1530.375849] kobject: 'tunl0' (00000000c3dc591c): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1530.385517] kobject: 'ip6_vti0' (00000000056990ae): kobject_cleanup, parent (null) [ 1530.394160] kobject: 'ip6_vti0' (00000000056990ae): auto cleanup 'remove' event [ 1530.401774] kobject: 'ip6_vti0' (00000000056990ae): kobject_uevent_env [ 1530.401980] kobject: 'tunl0' (00000000c3dc591c): kobject_cleanup, parent (null) [ 1530.408509] kobject: 'ip6_vti0' (00000000056990ae): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.408517] kobject: 'ip6_vti0' (00000000056990ae): calling ktype release [ 1530.408547] kobject: 'ip6_vti0': free name [ 1530.416989] kobject: 'tunl0' (00000000c3dc591c): calling ktype release [ 1530.427322] kobject: 'ip6_vti0' (00000000325c5213): kobject_cleanup, parent (null) [ 1530.435493] kobject: 'tunl0': free name [ 1530.439004] kobject: 'ip6_vti0' (00000000325c5213): auto cleanup 'remove' event [ 1530.465189] kobject: 'ip6_vti0' (00000000325c5213): kobject_uevent_env [ 1530.471954] kobject: 'ip6_vti0' (00000000325c5213): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.482407] kobject: 'ip6_vti0' (00000000325c5213): calling ktype release [ 1530.483410] kobject: 'rx-0' (00000000a1ab7c29): kobject_cleanup, parent 000000007726ec9d [ 1530.489407] kobject: 'ip6_vti0': free name [ 1530.497976] kobject: 'rx-0' (00000000a1ab7c29): auto cleanup 'remove' event [ 1530.509574] kobject: 'rx-0' (00000000a1ab7c29): kobject_uevent_env [ 1530.515921] kobject: 'rx-0' (00000000a1ab7c29): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1530.526067] kobject: 'rx-0' (00000000a1ab7c29): auto cleanup kobject_del [ 1530.532975] kobject: 'rx-0' (00000000a1ab7c29): calling ktype release [ 1530.539786] kobject: 'rx-0': free name [ 1530.543706] kobject: 'tx-0' (000000003b3983f0): kobject_cleanup, parent 000000007726ec9d [ 1530.551963] kobject: 'tx-0' (000000003b3983f0): auto cleanup 'remove' event [ 1530.559087] kobject: 'tx-0' (000000003b3983f0): kobject_uevent_env [ 1530.565414] kobject: 'tx-0' (000000003b3983f0): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1530.575481] kobject: 'tx-0' (000000003b3983f0): auto cleanup kobject_del [ 1530.582374] kobject: 'tx-0' (000000003b3983f0): calling ktype release [ 1530.588978] kobject: 'tx-0': free name [ 1530.592880] kobject: 'queues' (000000007726ec9d): kobject_cleanup, parent (null) [ 1530.601334] kobject: 'queues' (000000007726ec9d): calling ktype release [ 1530.608114] kobject: 'queues' (000000007726ec9d): kset_release [ 1530.614085] kobject: 'queues': free name [ 1530.618560] kobject: 'lo' (00000000a932e94c): kobject_uevent_env [ 1530.624732] kobject: 'lo' (00000000a932e94c): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1530.634149] kobject: 'rx-0' (00000000cba5108e): kobject_cleanup, parent 0000000063467286 [ 1530.642413] kobject: 'rx-0' (00000000cba5108e): auto cleanup 'remove' event [ 1530.649576] kobject: 'rx-0' (00000000cba5108e): kobject_uevent_env [ 1530.655907] kobject: 'rx-0' (00000000cba5108e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.665979] kobject: 'rx-0' (00000000cba5108e): auto cleanup kobject_del [ 1530.672908] kobject: 'rx-0' (00000000cba5108e): calling ktype release [ 1530.679535] kobject: 'rx-0': free name [ 1530.683460] kobject: 'tx-0' (00000000f5601d4d): kobject_cleanup, parent 0000000063467286 [ 1530.691717] kobject: 'tx-0' (00000000f5601d4d): auto cleanup 'remove' event [ 1530.698885] kobject: 'tx-0' (00000000f5601d4d): kobject_uevent_env [ 1530.705191] kobject: 'tx-0' (00000000f5601d4d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.715291] kobject: 'tx-0' (00000000f5601d4d): auto cleanup kobject_del [ 1530.722305] kobject: 'tx-0' (00000000f5601d4d): calling ktype release [ 1530.728923] kobject: 'tx-0': free name [ 1530.732828] kobject: 'queues' (0000000063467286): kobject_cleanup, parent (null) [ 1530.741251] kobject: 'queues' (0000000063467286): calling ktype release [ 1530.748028] kobject: 'queues' (0000000063467286): kset_release [ 1530.753999] kobject: 'queues': free name [ 1530.758458] kobject: 'ip_vti0' (0000000014569c50): kobject_uevent_env [ 1530.765027] kobject: 'ip_vti0' (0000000014569c50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.775770] kobject: 'rx-0' (00000000101fba58): kobject_cleanup, parent 000000008f64e306 [ 1530.784014] kobject: 'rx-0' (00000000101fba58): auto cleanup 'remove' event [ 1530.791168] kobject: 'rx-0' (00000000101fba58): kobject_uevent_env [ 1530.797541] kobject: 'rx-0' (00000000101fba58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.807633] kobject: 'rx-0' (00000000101fba58): auto cleanup kobject_del [ 1530.814511] kobject: 'rx-0' (00000000101fba58): calling ktype release [ 1530.821125] kobject: 'rx-0': free name [ 1530.825055] kobject: 'tx-0' (00000000147318da): kobject_cleanup, parent 000000008f64e306 [ 1530.833311] kobject: 'tx-0' (00000000147318da): auto cleanup 'remove' event [ 1530.840438] kobject: 'tx-0' (00000000147318da): kobject_uevent_env [ 1530.846740] kobject: 'tx-0' (00000000147318da): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.856827] kobject: 'tx-0' (00000000147318da): auto cleanup kobject_del [ 1530.863724] kobject: 'tx-0' (00000000147318da): calling ktype release [ 1530.870338] kobject: 'tx-0': free name [ 1530.874247] kobject: 'queues' (000000008f64e306): kobject_cleanup, parent (null) [ 1530.882676] kobject: 'queues' (000000008f64e306): calling ktype release [ 1530.889446] kobject: 'queues' (000000008f64e306): kset_release [ 1530.895403] kobject: 'queues': free name [ 1530.899830] kobject: 'ip_vti0' (00000000f7b95155): kobject_uevent_env [ 1530.906402] kobject: 'ip_vti0' (00000000f7b95155): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.918113] kobject: 'lo' (00000000a932e94c): kobject_cleanup, parent (null) [ 1530.926183] kobject: 'lo' (00000000a932e94c): calling ktype release [ 1530.932656] kobject: 'lo': free name [ 1530.947440] kobject: 'ip_vti0' (0000000014569c50): kobject_cleanup, parent (null) [ 1530.955929] kobject: 'ip_vti0' (0000000014569c50): auto cleanup 'remove' event [ 1530.963349] kobject: 'ip_vti0' (0000000014569c50): kobject_uevent_env [ 1530.970104] kobject: 'ip_vti0' (0000000014569c50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1530.980443] kobject: 'ip_vti0' (0000000014569c50): calling ktype release [ 1530.987325] kobject: 'ip_vti0': free name [ 1530.991517] kobject: 'ip_vti0' (00000000f7b95155): kobject_cleanup, parent (null) [ 1531.000049] kobject: 'ip_vti0' (00000000f7b95155): auto cleanup 'remove' event [ 1531.007436] kobject: 'ip_vti0' (00000000f7b95155): kobject_uevent_env [ 1531.013997] kobject: 'ip_vti0' (00000000f7b95155): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.024327] kobject: 'ip_vti0' (00000000f7b95155): calling ktype release [ 1531.031198] kobject: 'ip_vti0': free name [ 1531.036028] kobject: 'rx-0' (0000000087a67a38): kobject_cleanup, parent 00000000aec7c7e3 [ 1531.044329] kobject: 'rx-0' (0000000087a67a38): auto cleanup 'remove' event [ 1531.051460] kobject: 'rx-0' (0000000087a67a38): kobject_uevent_env [ 1531.057813] kobject: 'rx-0' (0000000087a67a38): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.067881] kobject: 'rx-0' (0000000087a67a38): auto cleanup kobject_del [ 1531.074723] kobject: 'rx-0' (0000000087a67a38): calling ktype release [ 1531.081332] kobject: 'rx-0': free name [ 1531.085248] kobject: 'tx-0' (00000000fdff1165): kobject_cleanup, parent 00000000aec7c7e3 [ 1531.093502] kobject: 'tx-0' (00000000fdff1165): auto cleanup 'remove' event [ 1531.100621] kobject: 'tx-0' (00000000fdff1165): kobject_uevent_env [ 1531.106923] kobject: 'tx-0' (00000000fdff1165): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.116993] kobject: 'tx-0' (00000000fdff1165): auto cleanup kobject_del [ 1531.123879] kobject: 'tx-0' (00000000fdff1165): calling ktype release [ 1531.130474] kobject: 'tx-0': free name [ 1531.134384] kobject: 'queues' (00000000aec7c7e3): kobject_cleanup, parent (null) [ 1531.142842] kobject: 'queues' (00000000aec7c7e3): calling ktype release [ 1531.149609] kobject: 'queues' (00000000aec7c7e3): kset_release [ 1531.155567] kobject: 'queues': free name [ 1531.159977] kobject: 'erspan0' (00000000d693fda3): kobject_uevent_env [ 1531.166552] kobject: 'erspan0' (00000000d693fda3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.177673] kobject: 'rx-0' (00000000627ff08b): kobject_cleanup, parent 0000000020be628e [ 1531.185896] kobject: 'rx-0' (00000000627ff08b): auto cleanup 'remove' event [ 1531.193245] kobject: 'rx-0' (00000000627ff08b): kobject_uevent_env [ 1531.199681] kobject: 'rx-0' (00000000627ff08b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.209796] kobject: 'rx-0' (00000000627ff08b): auto cleanup kobject_del [ 1531.216674] kobject: 'rx-0' (00000000627ff08b): calling ktype release [ 1531.223308] kobject: 'rx-0': free name [ 1531.227296] kobject: 'tx-0' (00000000bb6e3d5a): kobject_cleanup, parent 0000000020be628e [ 1531.235528] kobject: 'tx-0' (00000000bb6e3d5a): auto cleanup 'remove' event [ 1531.242671] kobject: 'tx-0' (00000000bb6e3d5a): kobject_uevent_env [ 1531.249029] kobject: 'tx-0' (00000000bb6e3d5a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.259142] kobject: 'tx-0' (00000000bb6e3d5a): auto cleanup kobject_del [ 1531.266042] kobject: 'tx-0' (00000000bb6e3d5a): calling ktype release [ 1531.272663] kobject: 'tx-0': free name [ 1531.276582] kobject: 'queues' (0000000020be628e): kobject_cleanup, parent (null) [ 1531.285043] kobject: 'queues' (0000000020be628e): calling ktype release [ 1531.291838] kobject: 'queues' (0000000020be628e): kset_release [ 1531.297851] kobject: 'queues': free name [ 1531.302392] kobject: 'erspan0' (000000006fc71212): kobject_uevent_env [ 1531.309028] kobject: 'erspan0' (000000006fc71212): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.367340] kobject: 'erspan0' (00000000d693fda3): kobject_cleanup, parent (null) [ 1531.375871] kobject: 'erspan0' (00000000d693fda3): auto cleanup 'remove' event [ 1531.383853] kobject: 'erspan0' (00000000d693fda3): kobject_uevent_env [ 1531.390647] kobject: 'erspan0' (00000000d693fda3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.401245] kobject: 'erspan0' (00000000d693fda3): calling ktype release [ 1531.408365] kobject: 'erspan0': free name [ 1531.412568] kobject: 'erspan0' (000000006fc71212): kobject_cleanup, parent (null) [ 1531.421493] kobject: 'erspan0' (000000006fc71212): auto cleanup 'remove' event [ 1531.429118] kobject: 'erspan0' (000000006fc71212): kobject_uevent_env [ 1531.435711] kobject: 'erspan0' (000000006fc71212): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.446295] kobject: 'erspan0' (000000006fc71212): calling ktype release [ 1531.453410] kobject: 'erspan0': free name [ 1531.500241] kobject: 'rx-0' (0000000023996c3e): kobject_cleanup, parent 0000000093a0ba37 [ 1531.509070] kobject: 'rx-0' (0000000023996c3e): auto cleanup 'remove' event [ 1531.516173] kobject: 'rx-0' (0000000023996c3e): kobject_uevent_env [ 1531.522834] kobject: 'rx-0' (0000000023996c3e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.533222] kobject: 'rx-0' (0000000023996c3e): auto cleanup kobject_del [ 1531.540712] kobject: 'rx-0' (0000000023996c3e): calling ktype release [ 1531.547530] kobject: 'rx-0': free name [ 1531.551487] kobject: 'tx-0' (0000000097f0bbc1): kobject_cleanup, parent 0000000093a0ba37 [ 1531.559939] kobject: 'tx-0' (0000000097f0bbc1): auto cleanup 'remove' event [ 1531.567048] kobject: 'tx-0' (0000000097f0bbc1): kobject_uevent_env [ 1531.573644] kobject: 'tx-0' (0000000097f0bbc1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.583931] kobject: 'tx-0' (0000000097f0bbc1): auto cleanup kobject_del [ 1531.591048] kobject: 'tx-0' (0000000097f0bbc1): calling ktype release [ 1531.597868] kobject: 'tx-0': free name [ 1531.601833] kobject: 'queues' (0000000093a0ba37): kobject_cleanup, parent (null) [ 1531.610603] kobject: 'queues' (0000000093a0ba37): calling ktype release [ 1531.617566] kobject: 'queues' (0000000093a0ba37): kset_release [ 1531.623528] kobject: 'queues': free name [ 1531.627985] kobject: 'gretap0' (0000000056da4c22): kobject_uevent_env [ 1531.634563] kobject: 'gretap0' (0000000056da4c22): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.645687] kobject: 'rx-0' (000000007cd160b1): kobject_cleanup, parent 00000000259fb269 [ 1531.653955] kobject: 'rx-0' (000000007cd160b1): auto cleanup 'remove' event [ 1531.661092] kobject: 'rx-0' (000000007cd160b1): kobject_uevent_env [ 1531.667472] kobject: 'rx-0' (000000007cd160b1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.677594] kobject: 'rx-0' (000000007cd160b1): auto cleanup kobject_del [ 1531.684449] kobject: 'rx-0' (000000007cd160b1): calling ktype release [ 1531.691066] kobject: 'rx-0': free name [ 1531.694988] kobject: 'tx-0' (000000008a6dbbc9): kobject_cleanup, parent 00000000259fb269 [ 1531.703235] kobject: 'tx-0' (000000008a6dbbc9): auto cleanup 'remove' event [ 1531.710358] kobject: 'tx-0' (000000008a6dbbc9): kobject_uevent_env [ 1531.716658] kobject: 'tx-0' (000000008a6dbbc9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.726729] kobject: 'tx-0' (000000008a6dbbc9): auto cleanup kobject_del [ 1531.733641] kobject: 'tx-0' (000000008a6dbbc9): calling ktype release [ 1531.740337] kobject: 'tx-0': free name [ 1531.744304] kobject: 'queues' (00000000259fb269): kobject_cleanup, parent (null) [ 1531.752765] kobject: 'queues' (00000000259fb269): calling ktype release [ 1531.759548] kobject: 'queues' (00000000259fb269): kset_release [ 1531.765519] kobject: 'queues': free name [ 1531.769953] kobject: 'gretap0' (00000000aa35ff7b): kobject_uevent_env [ 1531.776524] kobject: 'gretap0' (00000000aa35ff7b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.817326] kobject: 'gretap0' (0000000056da4c22): kobject_cleanup, parent (null) [ 1531.825860] kobject: 'gretap0' (0000000056da4c22): auto cleanup 'remove' event [ 1531.833261] kobject: 'gretap0' (0000000056da4c22): kobject_uevent_env [ 1531.840089] kobject: 'gretap0' (0000000056da4c22): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.850435] kobject: 'gretap0' (0000000056da4c22): calling ktype release [ 1531.857314] kobject: 'gretap0': free name [ 1531.861486] kobject: 'gretap0' (00000000aa35ff7b): kobject_cleanup, parent (null) [ 1531.869997] kobject: 'gretap0' (00000000aa35ff7b): auto cleanup 'remove' event [ 1531.877382] kobject: 'gretap0' (00000000aa35ff7b): kobject_uevent_env [ 1531.883945] kobject: 'gretap0' (00000000aa35ff7b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.894281] kobject: 'gretap0' (00000000aa35ff7b): calling ktype release [ 1531.901145] kobject: 'gretap0': free name [ 1531.905718] kobject: 'rx-0' (0000000066df92bf): kobject_cleanup, parent 00000000baef5afe [ 1531.913994] kobject: 'rx-0' (0000000066df92bf): auto cleanup 'remove' event [ 1531.921138] kobject: 'rx-0' (0000000066df92bf): kobject_uevent_env [ 1531.927479] kobject: 'rx-0' (0000000066df92bf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.937551] kobject: 'rx-0' (0000000066df92bf): auto cleanup kobject_del [ 1531.944413] kobject: 'rx-0' (0000000066df92bf): calling ktype release [ 1531.951044] kobject: 'rx-0': free name [ 1531.955006] kobject: 'tx-0' (00000000bcc61fc9): kobject_cleanup, parent 00000000baef5afe [ 1531.963285] kobject: 'tx-0' (00000000bcc61fc9): auto cleanup 'remove' event [ 1531.970403] kobject: 'tx-0' (00000000bcc61fc9): kobject_uevent_env [ 1531.976703] kobject: 'tx-0' (00000000bcc61fc9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1531.986786] kobject: 'tx-0' (00000000bcc61fc9): auto cleanup kobject_del [ 1531.993701] kobject: 'tx-0' (00000000bcc61fc9): calling ktype release [ 1532.000313] kobject: 'tx-0': free name [ 1532.004214] kobject: 'queues' (00000000baef5afe): kobject_cleanup, parent (null) [ 1532.012643] kobject: 'queues' (00000000baef5afe): calling ktype release [ 1532.019411] kobject: 'queues' (00000000baef5afe): kset_release [ 1532.025367] kobject: 'queues': free name [ 1532.029785] kobject: 'gre0' (0000000020829b39): kobject_uevent_env [ 1532.036092] kobject: 'gre0' (0000000020829b39): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.046537] kobject: 'rx-0' (000000006de70e6b): kobject_cleanup, parent 0000000006910746 [ 1532.054796] kobject: 'rx-0' (000000006de70e6b): auto cleanup 'remove' event [ 1532.062031] kobject: 'rx-0' (000000006de70e6b): kobject_uevent_env [ 1532.068415] kobject: 'rx-0' (000000006de70e6b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.078512] kobject: 'rx-0' (000000006de70e6b): auto cleanup kobject_del [ 1532.085380] kobject: 'rx-0' (000000006de70e6b): calling ktype release [ 1532.091995] kobject: 'rx-0': free name [ 1532.095950] kobject: 'tx-0' (00000000f1882df6): kobject_cleanup, parent 0000000006910746 [ 1532.104253] kobject: 'tx-0' (00000000f1882df6): auto cleanup 'remove' event [ 1532.111408] kobject: 'tx-0' (00000000f1882df6): kobject_uevent_env [ 1532.117757] kobject: 'tx-0' (00000000f1882df6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.127827] kobject: 'tx-0' (00000000f1882df6): auto cleanup kobject_del [ 1532.134684] kobject: 'tx-0' (00000000f1882df6): calling ktype release [ 1532.141542] kobject: 'tx-0': free name [ 1532.145442] kobject: 'queues' (0000000006910746): kobject_cleanup, parent (null) [ 1532.153869] kobject: 'queues' (0000000006910746): calling ktype release [ 1532.160640] kobject: 'queues' (0000000006910746): kset_release [ 1532.166595] kobject: 'queues': free name [ 1532.171094] kobject: 'gre0' (00000000a49e1dc7): kobject_uevent_env [ 1532.177430] kobject: 'gre0' (00000000a49e1dc7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.217498] kobject: 'gre0' (0000000020829b39): kobject_cleanup, parent (null) [ 1532.225755] kobject: 'gre0' (0000000020829b39): auto cleanup 'remove' event [ 1532.232895] kobject: 'gre0' (0000000020829b39): kobject_uevent_env [ 1532.239242] kobject: 'gre0' (0000000020829b39): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.249327] kobject: 'gre0' (0000000020829b39): calling ktype release [ 1532.255913] kobject: 'gre0': free name [ 1532.259867] kobject: 'gre0' (00000000a49e1dc7): kobject_cleanup, parent (null) [ 1532.268113] kobject: 'gre0' (00000000a49e1dc7): auto cleanup 'remove' event [ 1532.275204] kobject: 'gre0' (00000000a49e1dc7): kobject_uevent_env [ 1532.281542] kobject: 'gre0' (00000000a49e1dc7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.291608] kobject: 'gre0' (00000000a49e1dc7): calling ktype release [ 1532.298226] kobject: 'gre0': free name [ 1532.302556] kobject: 'rx-0' (000000008aa74fc2): kobject_cleanup, parent 00000000a7aad383 [ 1532.310865] kobject: 'rx-0' (000000008aa74fc2): auto cleanup 'remove' event [ 1532.318027] kobject: 'rx-0' (000000008aa74fc2): kobject_uevent_env [ 1532.324359] kobject: 'rx-0' (000000008aa74fc2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.334487] kobject: 'rx-0' (000000008aa74fc2): auto cleanup kobject_del [ 1532.341820] kobject: 'rx-0' (000000008aa74fc2): calling ktype release [ 1532.348469] kobject: 'rx-0': free name [ 1532.352387] kobject: 'tx-0' (00000000bc2e8c47): kobject_cleanup, parent 00000000a7aad383 [ 1532.360725] kobject: 'tx-0' (00000000bc2e8c47): auto cleanup 'remove' event [ 1532.367865] kobject: 'tx-0' (00000000bc2e8c47): kobject_uevent_env [ 1532.374209] kobject: 'tx-0' (00000000bc2e8c47): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.384285] kobject: 'tx-0' (00000000bc2e8c47): auto cleanup kobject_del [ 1532.391225] kobject: 'tx-0' (00000000bc2e8c47): calling ktype release [ 1532.397843] kobject: 'tx-0': free name [ 1532.401738] kobject: 'queues' (00000000a7aad383): kobject_cleanup, parent (null) [ 1532.410191] kobject: 'queues' (00000000a7aad383): calling ktype release [ 1532.416958] kobject: 'queues' (00000000a7aad383): kset_release [ 1532.423011] kobject: 'queues': free name [ 1532.427484] kobject: 'tunl0' (00000000c35a0f5d): kobject_uevent_env [ 1532.433882] kobject: 'tunl0' (00000000c35a0f5d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.444530] kobject: 'rx-0' (00000000cd10fecd): kobject_cleanup, parent 000000001144791b [ 1532.452813] kobject: 'rx-0' (00000000cd10fecd): auto cleanup 'remove' event [ 1532.460083] kobject: 'rx-0' (00000000cd10fecd): kobject_uevent_env [ 1532.466400] kobject: 'rx-0' (00000000cd10fecd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.476492] kobject: 'rx-0' (00000000cd10fecd): auto cleanup kobject_del [ 1532.483398] kobject: 'rx-0' (00000000cd10fecd): calling ktype release [ 1532.489999] kobject: 'rx-0': free name [ 1532.493921] kobject: 'tx-0' (0000000021e108d5): kobject_cleanup, parent 000000001144791b [ 1532.502182] kobject: 'tx-0' (0000000021e108d5): auto cleanup 'remove' event [ 1532.509306] kobject: 'tx-0' (0000000021e108d5): kobject_uevent_env [ 1532.515608] kobject: 'tx-0' (0000000021e108d5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.525688] kobject: 'tx-0' (0000000021e108d5): auto cleanup kobject_del [ 1532.532580] kobject: 'tx-0' (0000000021e108d5): calling ktype release [ 1532.539179] kobject: 'tx-0': free name [ 1532.543081] kobject: 'queues' (000000001144791b): kobject_cleanup, parent (null) [ 1532.551507] kobject: 'queues' (000000001144791b): calling ktype release [ 1532.558283] kobject: 'queues' (000000001144791b): kset_release [ 1532.564248] kobject: 'queues': free name [ 1532.568689] kobject: 'tunl0' (0000000013653a05): kobject_uevent_env [ 1532.575086] kobject: 'tunl0' (0000000013653a05): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.627384] kobject: 'tunl0' (00000000c35a0f5d): kobject_cleanup, parent (null) [ 1532.635735] kobject: 'tunl0' (00000000c35a0f5d): auto cleanup 'remove' event [ 1532.643061] kobject: 'tunl0' (00000000c35a0f5d): kobject_uevent_env [ 1532.649490] kobject: 'tunl0' (00000000c35a0f5d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.659715] kobject: 'tunl0' (00000000c35a0f5d): calling ktype release [ 1532.666391] kobject: 'tunl0': free name [ 1532.670705] kobject: 'tunl0' (0000000013653a05): kobject_cleanup, parent (null) [ 1532.679100] kobject: 'tunl0' (0000000013653a05): auto cleanup 'remove' event [ 1532.686303] kobject: 'tunl0' (0000000013653a05): kobject_uevent_env [ 1532.692740] kobject: 'tunl0' (0000000013653a05): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.702914] kobject: 'tunl0' (0000000013653a05): calling ktype release [ 1532.709679] kobject: 'tunl0': free name [ 1532.714371] kobject: 'rx-0' (000000008fd59a32): kobject_cleanup, parent 000000004cf14e98 [ 1532.722663] kobject: 'rx-0' (000000008fd59a32): auto cleanup 'remove' event [ 1532.729782] kobject: 'rx-0' (000000008fd59a32): kobject_uevent_env [ 1532.736105] kobject: 'rx-0' (000000008fd59a32): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.746176] kobject: 'rx-0' (000000008fd59a32): auto cleanup kobject_del [ 1532.753064] kobject: 'rx-0' (000000008fd59a32): calling ktype release [ 1532.759671] kobject: 'rx-0': free name [ 1532.763597] kobject: 'tx-0' (000000001aa1c740): kobject_cleanup, parent 000000004cf14e98 [ 1532.771859] kobject: 'tx-0' (000000001aa1c740): auto cleanup 'remove' event [ 1532.779405] kobject: 'tx-0' (000000001aa1c740): kobject_uevent_env [ 1532.785731] kobject: 'tx-0' (000000001aa1c740): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.795817] kobject: 'tx-0' (000000001aa1c740): auto cleanup kobject_del [ 1532.802729] kobject: 'tx-0' (000000001aa1c740): calling ktype release [ 1532.809326] kobject: 'tx-0': free name [ 1532.813223] kobject: 'queues' (000000004cf14e98): kobject_cleanup, parent (null) [ 1532.821661] kobject: 'queues' (000000004cf14e98): calling ktype release [ 1532.828445] kobject: 'queues' (000000004cf14e98): kset_release [ 1532.834403] kobject: 'queues': free name [ 1532.838835] kobject: 'lo' (000000003ce70441): kobject_uevent_env [ 1532.844979] kobject: 'lo' (000000003ce70441): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.855554] kobject: 'rx-0' (00000000ba568f43): kobject_cleanup, parent 0000000033724801 [ 1532.863836] kobject: 'rx-0' (00000000ba568f43): auto cleanup 'remove' event [ 1532.871073] kobject: 'rx-0' (00000000ba568f43): kobject_uevent_env [ 1532.877413] kobject: 'rx-0' (00000000ba568f43): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.887487] kobject: 'rx-0' (00000000ba568f43): auto cleanup kobject_del [ 1532.894331] kobject: 'rx-0' (00000000ba568f43): calling ktype release [ 1532.900932] kobject: 'rx-0': free name [ 1532.904863] kobject: 'tx-0' (00000000f04986e8): kobject_cleanup, parent 0000000033724801 [ 1532.913119] kobject: 'tx-0' (00000000f04986e8): auto cleanup 'remove' event [ 1532.920261] kobject: 'tx-0' (00000000f04986e8): kobject_uevent_env [ 1532.926573] kobject: 'tx-0' (00000000f04986e8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1532.936660] kobject: 'tx-0' (00000000f04986e8): auto cleanup kobject_del [ 1532.943601] kobject: 'tx-0' (00000000f04986e8): calling ktype release [ 1532.950223] kobject: 'tx-0': free name [ 1532.954122] kobject: 'queues' (0000000033724801): kobject_cleanup, parent (null) [ 1532.962781] kobject: 'queues' (0000000033724801): calling ktype release [ 1532.969569] kobject: 'queues' (0000000033724801): kset_release [ 1532.975538] kobject: 'queues': free name [ 1532.979954] kobject: 'lo' (0000000066052b0a): kobject_uevent_env [ 1532.986103] kobject: 'lo' (0000000066052b0a): kobject_uevent_env: uevent_suppress caused the event to drop! 18:32:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:32:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) fchmod(r0, 0x11) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x7, 0x4, 0x47c, 0x258, 0x0, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0xbd696c5, 0x1f, 0x3}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @multicast2, @local, 0xf}}}, {{@arp={@multicast1, @loopback, 0xff, 0xff000000, @mac=@local, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0xa}, {[0xff, 0x0, 0xff, 0x0, 0xff]}, 0x7fc0000000000000, 0x0, 0xffffffffffffd5b5, 0x0, 0x80000001, 0x2d35, 'ip6tnl0\x00', 'team0\x00', {0xff}, {0xff}, 0x0, 0x100}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @local, 0x7, 0xffffffff}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4c8) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x9a02000000000000]}, 0x2c) 18:32:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000fffe00", @ifru_flags}) 18:32:31 executing program 1: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:31 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1533.027343] kobject: 'lo' (000000003ce70441): kobject_cleanup, parent (null) [ 1533.035445] kobject: 'lo' (000000003ce70441): auto cleanup 'remove' event [ 1533.065292] kobject: 'lo' (000000003ce70441): kobject_uevent_env 18:32:31 executing program 1: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 1533.072622] kobject: 'lo' (000000003ce70441): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1533.078071] kobject: 'hci1' (0000000053684511): kobject_add_internal: parent: 'bluetooth', set: 'devices' [ 1533.083403] kobject: 'lo' (000000003ce70441): calling ktype release [ 1533.099310] kobject: 'lo': free name [ 1533.103235] kobject: 'lo' (0000000066052b0a): kobject_cleanup, parent (null) [ 1533.114185] kobject: 'lo' (0000000066052b0a): auto cleanup 'remove' event 18:32:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00\x00@\x00', @ifru_flags}) 18:32:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3de]}, 0x2c) [ 1533.123734] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1533.133011] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1533.142003] kobject: 'lo' (0000000066052b0a): kobject_uevent_env [ 1533.153923] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env [ 1533.171319] kobject: 'hci1' (0000000053684511): kobject_uevent_env 18:32:31 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) [ 1533.175726] kobject: 'lo' (0000000066052b0a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1533.190463] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1533.204404] kobject: 'lo' (0000000066052b0a): calling ktype release [ 1533.207996] kobject: 'hci1' (0000000053684511): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1' [ 1533.218344] kobject: 'lo': free name 18:32:31 executing program 1: socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x894a, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x11]}, 0x2c) [ 1533.228279] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1533.234721] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1533.254386] kobject: 'rfkill675' (00000000463838da): kobject_add_internal: parent: 'hci1', set: 'devices' [ 1533.271567] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1533.292619] kobject: 'rfkill675' (00000000463838da): kobject_uevent_env [ 1533.307076] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1533.319056] kobject: 'rfkill675' (00000000463838da): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1/rfkill675' [ 1533.331297] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env 18:32:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000260007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 18:32:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000400", @ifru_flags}) 18:32:32 executing program 4: socketpair$unix(0x1, 0xa, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000aa3eea192a03000000000000000000000000000000000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x80000, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x14]}, 0x2c) [ 1533.342878] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1533.360255] kobject: 'rfkill675' (00000000463838da): kobject_uevent_env [ 1533.362608] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1533.375395] kobject: 'rfkill675' (00000000463838da): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1/rfkill675' [ 1533.411868] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1533.446293] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1533.470816] kobject: 'rfkill675' (00000000463838da): kobject_cleanup, parent (null) [ 1533.486885] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1533.488519] kobject: 'rfkill675' (00000000463838da): calling ktype release [ 1533.508094] kobject: 'rfkill675': free name [ 1533.509626] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1533.514336] kobject: 'hci1' (0000000053684511): kobject_uevent_env [ 1533.519088] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1533.519560] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1533.542195] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1533.552326] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1533.558911] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1533.560566] kobject: 'hci1' (0000000053684511): fill_kobj_path: path = '/devices/virtual/bluetooth/hci1' [ 1533.573891] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1533.585534] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1533.595774] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env [ 1533.604372] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1533.627796] kobject: 'hci1' (0000000053684511): kobject_cleanup, parent (null) [ 1533.636150] kobject: 'hci1' (0000000053684511): calling ktype release 18:32:32 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x3d, "bd0080f2445d497b9045babdbacca5d4d201eb12ed2613cc57420eafe00c13d0b250d66b8d927b8cd4df8d8177113211e34d95e77d890d177f8afaca7f"}, &(0x7f0000000080)=0x45) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'bond0\x00', &(0x7f0000000040)=@ethtool_coalesce={0xe, 0x2, 0x6, 0x46a, 0x4, 0x10000, 0x8, 0x3, 0x2, 0x5d9f, 0xb3c, 0x8001, 0x7, 0x100000001, 0xe7c, 0x101, 0x2, 0x7f, 0x4, 0x4, 0x7, 0xfffffffffffffffe, 0x2}}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x65}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="008dada50cfcc99e95485cbdb88b", 0x0, 0xffffffff00000f65}, 0x28) 18:32:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x6]}, 0x2c) 18:32:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000000000000000100", @ifru_flags}) [ 1533.678435] kobject: 'hci1': free name [ 1533.692069] kobject: 'loop2' (000000001af22e88): kobject_uevent_env 18:32:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x3]}, 0x2c) [ 1533.722361] kobject: 'loop2' (000000001af22e88): fill_kobj_path: path = '/devices/virtual/block/loop2' 18:32:32 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0xfd07) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) 18:32:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:32:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x180, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080)=0x8, 0x4) [ 1533.782794] kobject: 'loop5' (000000000e374401): kobject_uevent_env 18:32:32 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', @ifru_flags}) [ 1533.829956] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1533.861902] kobject: 'loop2' (000000001af22e88): kobject_uevent_env 18:32:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf8020000]}, 0x2c) 18:32:32 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0xfd07) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) 18:32:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x80001) [ 1533.897786] kobject: 'loop2' (000000001af22e88): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1533.936624] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env 18:32:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, 0x0) 18:32:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000000000000fffe00", @ifru_flags}) [ 1533.960651] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1533.999246] kobject: 'loop5' (000000000e374401): kobject_uevent_env 18:32:32 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) [ 1534.009086] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1534.041936] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env 18:32:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xec030000]}, 0x2c) 18:32:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, 0x0) 18:32:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000005000000000000000000000000000000000000009acb00060000000000000000000000000000000000000000000000"], 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 18:32:32 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0xfd07) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) 18:32:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000000000000000400", @ifru_flags}) [ 1534.077295] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1534.093823] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1534.127495] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1534.153068] kobject: 'loop2' (000000001af22e88): kobject_uevent_env 18:32:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xa002]}, 0x2c) [ 1534.178110] kobject: 'loop2' (000000001af22e88): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1534.199331] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1534.213251] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' 18:32:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80003, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/25, 0x19}, {&(0x7f0000000240)=""/126, 0x7e}, {&(0x7f00000002c0)=""/186, 0xba}, {&(0x7f0000000380)=""/209, 0xd1}, {&(0x7f0000000080)=""/18, 0x12}, {&(0x7f0000000480)=""/205, 0xcd}], 0x6, 0x0) 18:32:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x894a, 0x0) [ 1534.229879] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1534.243549] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' 18:32:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000000fffe00", @ifru_flags}) 18:32:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000003c0)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c466f7d00000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000a694adc56eacc28dea7ded3dfb6eac234fb5ff030000cdf223c5f6c7e4b2146e8eeeef63cb5388662817d29cbd1e5812610621699de612d3"], 0x58) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0xeb9, 0x1f, 0x0, 0xbbde, 0x0, 0x1000, 0x20012, 0x5, 0x9, 0x9, 0x80000001, 0x905, 0x4, 0x6d60, 0x2608, 0x1f, 0x100, 0x9, 0x5, 0xffffffffffff2c81, 0x7, 0x3, 0x7ff, 0xfa7, 0x6, 0x8000, 0x8ab, 0x1, 0x6, 0x80000000, 0xa201, 0x7, 0x2, 0x3b11, 0x2, 0x100000000, 0x0, 0x4, 0x5, @perf_bp={&(0x7f0000000100), 0x9}, 0x100, 0x5, 0x1ff, 0x2, 0x9, 0x2, 0xfffffffffffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/169) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x100000000, @loopback, 0x7fffffff}, @in6={0xa, 0x4e23, 0x2, @ipv4={[], [], @rand_addr=0x3}, 0x7}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, 0x8}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0x8214, @ipv4={[], [], @local}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x4e21, @rand_addr=0x1f}], 0xc0) 18:32:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x4000]}, 0x2c) [ 1534.275177] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env [ 1534.307324] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1534.348054] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1534.354540] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1534.392840] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1534.400197] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1534.410513] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env [ 1534.416959] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1534.434311] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1534.441127] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1534.451332] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1534.458213] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1534.653393] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env [ 1534.665798] kobject: 'rfkill658' (00000000df27baf7): kobject_uevent_env [ 1534.672707] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1534.681798] kobject: 'rfkill658' (00000000df27baf7): fill_kobj_path: path = '/devices/virtual/bluetooth/hci0/rfkill658' [ 1534.704213] kobject: 'rfkill658' (00000000df27baf7): kobject_cleanup, parent (null) [ 1534.720493] kobject: 'rfkill658' (00000000df27baf7): calling ktype release [ 1534.728079] kobject: 'rfkill658': free name [ 1534.732516] kobject: 'hci0' (000000003c064b07): kobject_uevent_env [ 1534.747287] kobject: 'hci0' (000000003c064b07): fill_kobj_path: path = '/devices/virtual/bluetooth/hci0' [ 1534.757039] kobject: 'bluetooth' (00000000d20c99d0): kobject_cleanup, parent (null) [ 1534.766618] kobject: 'bluetooth' (00000000d20c99d0): calling ktype release [ 1534.773907] kobject: 'bluetooth': free name [ 1534.779397] kobject: 'hci0' (000000003c064b07): kobject_cleanup, parent (null) [ 1534.787964] kobject: 'hci0' (000000003c064b07): calling ktype release [ 1534.794658] kobject: 'hci0': free name [ 1534.837336] kobject: 'rx-0' (0000000093525e71): kobject_cleanup, parent 000000008477c680 [ 1534.845599] kobject: 'rx-0' (0000000093525e71): auto cleanup 'remove' event [ 1534.852876] kobject: 'rx-0' (0000000093525e71): kobject_uevent_env [ 1534.859758] kobject: 'rx-0' (0000000093525e71): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 1534.870947] kobject: 'rx-0' (0000000093525e71): auto cleanup kobject_del [ 1534.877870] kobject: 'rx-0' (0000000093525e71): calling ktype release [ 1534.884465] kobject: 'rx-0': free name [ 1534.888486] kobject: 'tx-0' (00000000c687a8d9): kobject_cleanup, parent 000000008477c680 [ 1534.896724] kobject: 'tx-0' (00000000c687a8d9): auto cleanup 'remove' event [ 1534.903881] kobject: 'tx-0' (00000000c687a8d9): kobject_uevent_env [ 1534.910315] kobject: 'tx-0' (00000000c687a8d9): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 1534.920828] kobject: 'tx-0' (00000000c687a8d9): auto cleanup kobject_del [ 1534.927722] kobject: 'tx-0' (00000000c687a8d9): calling ktype release [ 1534.934286] kobject: 'tx-0': free name [ 1534.938253] kobject: 'queues' (000000008477c680): kobject_cleanup, parent (null) [ 1534.946670] kobject: 'queues' (000000008477c680): calling ktype release [ 1534.953484] kobject: 'queues' (000000008477c680): kset_release [ 1534.959510] kobject: 'queues': free name [ 1534.963870] kobject: 'syz_tun' (00000000b8fcb3a0): kobject_uevent_env [ 1534.970512] kobject: 'syz_tun' (00000000b8fcb3a0): fill_kobj_path: path = '/devices/virtual/net/syz_tun' 18:32:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0xfd07) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) 18:32:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"736974300000000300", @ifru_flags}) 18:32:33 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0xfd07) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) 18:32:33 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x7fff, 0xffffffffffffffe1, 0xf54, 0x5, 0x3f, 0x101, {0x0, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x7f}}, 0x2, 0x5, 0xcf2, 0x6, 0xb870}}, &(0x7f0000000040)=0xb0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) 18:32:33 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) inotify_add_watch(r0, 0x0, 0x80000000) 18:32:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0x8]}, 0x2c) [ 1534.980484] kobject: 'syz_tun' (00000000b8fcb3a0): kobject_cleanup, parent (null) [ 1534.989039] kobject: 'syz_tun' (00000000b8fcb3a0): calling ktype release [ 1534.995904] kobject: 'syz_tun': free name 18:32:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xf400000000000000]}, 0x2c) 18:32:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={"7369743000000300", @ifru_flags}) 18:32:33 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0xfd07) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) 18:32:33 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_ATTR(r1, &(0x7f0000000040)={0x78}, 0xfd07) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) [ 1535.099873] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1535.106691] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' 18:32:33 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)="6196568c4633248eb654578454cce854eb1ebd3dc65c9e7106733cda69252a0e128834c66ee9ee10f954a90b6bfc1314b2c73e69fd34e8fa4d3d02319ccb85a3f280fd32a6db8fb5a4e1e119e2186f5d82888abdfa4bf14f77189a17783ee64760935a5fb4aaa319e3ead108ecf83fd4f774d9f18c709260bdda271e47ef6f556a23a8ae0f06aa2fa861", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x1, [], @raw_data=[0x6, 0xd2d, 0x8, 0xfffffffffffffffe, 0x6, 0x2, 0x9, 0x7, 0x5, 0x2bea, 0xfffffffffffff5f5, 0x1, 0x8020000, 0x2, 0x1, 0x200, 0x3f, 0xd198, 0x4, 0x8, 0x56ee48ce, 0x1fbb, 0xae, 0xed1, 0x80000001, 0x2, 0x3, 0x7, 0x3, 0x80000001, 0xa2, 0x4]}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$eventfd(r0, &(0x7f0000000240)=0xfffffffffffff0e9, 0xfffffffffffffecd) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 1535.162100] kobject: 'loop3' (000000007b621e9e): kobject_uevent_env 18:32:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0xa, 0x2000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f, 0x0, 0x0, 0x0, 0xb2020000]}, 0x2c) 18:32:33 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000140)=0x2) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000540)={0xa0}, 0xa0) [ 1535.214704] kobject: 'loop3' (000000007b621e9e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1535.245368] IPVS: ftp: loaded support on port[0] = 21 [ 1535.267578] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1535.274082] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1535.287899] kobject: 'lo' (00000000e08fbefb): kobject_add_internal: parent: 'net', set: 'devices' [ 1535.310446] kobject: 'lo' (00000000e08fbefb): kobject_uevent_env [ 1535.323403] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1535.334961] kobject: 'lo' (00000000e08fbefb): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1535.344659] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1535.360936] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1535.367764] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1535.377345] kobject: 'queues' (000000004da51f2c): kobject_add_internal: parent: 'lo', set: '' [ 1535.377380] kobject: 'queues' (000000004da51f2c): kobject_uevent_env [ 1535.377391] kobject: 'queues' (000000004da51f2c): kobject_uevent_env: filter function caused the event to drop! [ 1535.377417] kobject: 'rx-0' (000000003a284677): kobject_add_internal: parent: 'queues', set: 'queues' [ 1535.377477] kobject: 'rx-0' (000000003a284677): kobject_uevent_env [ 1535.377507] kobject: 'rx-0' (000000003a284677): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1535.377599] kobject: 'tx-0' (0000000024b73da9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1535.388593] kobject: 'loop1' (000000008c17f48d): kobject_uevent_env [ 1535.445289] kobject: 'tx-0' (0000000024b73da9): kobject_uevent_env [ 1535.451711] kobject: 'tx-0' (0000000024b73da9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1535.462876] kobject: 'tunl0' (00000000ec9eb353): kobject_add_internal: parent: 'net', set: 'devices' [ 1535.473164] kobject: 'tunl0' (00000000ec9eb353): kobject_uevent_env [ 1535.479698] kobject: 'tunl0' (00000000ec9eb353): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1535.486491] kobject: 'loop1' (000000008c17f48d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1535.489171] kobject: 'queues' (0000000015c00d45): kobject_add_internal: parent: 'tunl0', set: '' [ 1535.501195] kobject: 'loop4' (00000000d43b4e52): kobject_uevent_env [ 1535.513028] kobject: 'queues' (0000000015c00d45): kobject_uevent_env [ 1535.516224] kobject: 'loop4' (00000000d43b4e52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1535.529222] kobject: 'queues' (0000000015c00d45): kobject_uevent_env: filter function caused the event to drop! [ 1535.532534] kobject: 'loop5' (000000000e374401): kobject_uevent_env [ 1535.543811] kobject: 'rx-0' (00000000ce92daa3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1535.557278] kobject: 'loop5' (000000000e374401): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1535.557340] kobject: 'rx-0' (00000000ce92daa3): kobject_uevent_env [ 1535.584454] kobject: 'rx-0' (00000000ce92daa3): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1535.595343] kobject: 'tx-0' (000000003a61d941): kobject_add_internal: parent: 'queues', set: 'queues' [ 1535.605372] kobject: 'tx-0' (000000003a61d941): kobject_uevent_env [ 1535.612236] kobject: 'tx-0' (000000003a61d941): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1535.627158] kobject: 'gre0' (000000007b12214d): kobject_add_internal: parent: 'net', set: 'devices' [ 1535.637954] kobject: 'gre0' (000000007b12214d): kobject_uevent_env [ 1535.644333] kobject: 'gre0' (000000007b12214d): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1535.656305] kobject: 'queues' (00000000e15aaa83): kobject_add_internal: parent: 'gre0', set: '' [ 1535.666218] kobject: 'queues' (00000000e15aaa83): kobject_uevent_env [ 1535.673008] kobject: 'queues' (00000000e15aaa83): kobject_uevent_env: filter function caused the event to drop! [ 1535.683564] kobject: 'rx-0' (0000000087dc0fc0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1535.693097] kobject: 'rx-0' (0000000087dc0fc0): kobject_uevent_env [ 1535.699503] kobject: 'rx-0' (0000000087dc0fc0): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1535.709739] kobject: 'tx-0' (00000000b516797a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1535.719365] kobject: 'tx-0' (00000000b516797a): kobject_uevent_env [ 1535.725709] kobject: 'tx-0' (00000000b516797a): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1535.736550] kobject: 'gretap0' (00000000b534f2a6):