[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 63.695901][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 63.695928][ T31] audit: type=1800 audit(1566395348.748:29): pid=10039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 63.732291][ T31] audit: type=1800 audit(1566395348.778:30): pid=10039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.231' (ECDSA) to the list of known hosts. 2019/08/21 13:49:18 fuzzer started 2019/08/21 13:49:22 dialing manager at 10.128.0.26:44297 2019/08/21 13:49:23 syscalls: 2376 2019/08/21 13:49:23 code coverage: enabled 2019/08/21 13:49:23 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/08/21 13:49:23 extra coverage: enabled 2019/08/21 13:49:23 setuid sandbox: enabled 2019/08/21 13:49:23 namespace sandbox: enabled 2019/08/21 13:49:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/21 13:49:23 fault injection: enabled 2019/08/21 13:49:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/21 13:49:23 net packet injection: enabled 2019/08/21 13:49:23 net device setup: enabled 13:51:24 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x41, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x0, 0x0, 0x79c4}) write$binfmt_aout(r0, 0x0, 0x7ffffffff000) syzkaller login: [ 199.690484][T10204] IPVS: ftp: loaded support on port[0] = 21 [ 199.806391][T10204] chnl_net:caif_netlink_parms(): no params data found [ 199.853250][T10204] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.860379][T10204] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.868766][T10204] device bridge_slave_0 entered promiscuous mode [ 199.877773][T10204] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.884958][T10204] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.893319][T10204] device bridge_slave_1 entered promiscuous mode [ 199.920197][T10204] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.932082][T10204] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.959963][T10204] team0: Port device team_slave_0 added [ 199.968786][T10204] team0: Port device team_slave_1 added [ 200.035211][T10204] device hsr_slave_0 entered promiscuous mode [ 200.192080][T10204] device hsr_slave_1 entered promiscuous mode [ 200.468242][T10204] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.475417][T10204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.483057][T10204] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.490192][T10204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.555954][T10204] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.573078][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.583722][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.593292][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.606332][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 200.623252][T10204] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.644682][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.653901][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.661023][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.669005][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.677947][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.685090][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.713786][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.723622][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.742777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.751345][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.760180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.773981][T10204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.800139][T10204] 8021q: adding VLAN 0 to HW filter on device batadv0 13:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 13:51:26 executing program 0: r0 = socket(0x1, 0x1, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = gettid() ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) prctl$PR_GET_PDEATHSIG(0x2, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RSTATFS(r0, 0x0, 0x0) tkill(r1, 0x1000000000016) [ 201.135775][T10215] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:51:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f00000003c0)) 13:51:26 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 13:51:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x7ffffffffffffff, 0x105082) readv(r0, &(0x7f0000000180)=[{&(0x7f0000001200)=""/4096, 0xfffffe19}], 0x1) 13:51:26 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x1000000002806, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000002300000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000080f882dccab370b227c3c9139f8ec7144f651bedff8afafce2d93041b54c5a85307abcca720d2cd28c12a628ea1dd314d8edc7e1fa5f96f4498be5bd459bb3655167cafab09cd86fa63829"], 0x119) write$UHID_INPUT2(r0, &(0x7f00000000c0), 0x6) 13:51:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) io_setup(0x4, &(0x7f0000000500)=0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}]) [ 201.928196][ T3363] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 13:51:27 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x2) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = accept(r1, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x80) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@gettfilter={0x34, 0x2e, 0x0, 0x70bd29, 0x25dfdbfd, {0x0, r3, {0xffff, 0x1cc9b6f93e0cc878}, {0x1f, 0xa}, {0xffe0}}, [{0x8, 0xb, 0x9}, {0x8, 0xb, 0x8b6}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x3, 0x0, 0x10001, 0xffffffffffff7fff}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x1d1, r4, 0x10000, 0x1ff}) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x61) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r5, 0x200, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0xfffffffffffff0b7, @bearer=@udp='udp:syz1\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x62cfe71d5962c1f4}, 0x40090) openat$cgroup_procs(r0, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000480)=""/67) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80c90000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r7, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x7fff) preadv(r6, &(0x7f00000007c0)=[{&(0x7f0000000680)}, {&(0x7f00000006c0)=""/249, 0xf9}], 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000800)=[@in6={0xa, 0x4e23, 0x0, @mcast1, 0x3ff}, @in={0x2, 0x4e22, @loopback}], 0x2c) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000840)={0x3, 0x1, [{0x5, 0x0, 0x4}, {0x8, 0x0, 0x1}, {0x3, 0x0, 0x8}]}) modify_ldt$write(0x1, &(0x7f0000000880)={0xc1a, 0x0, 0x0, 0x100000000, 0xffff, 0xe0dc, 0x7fff, 0x401, 0x8, 0x1}, 0x10) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000008c0)=@dstopts={0x0, 0x0, [], [@ra={0x5, 0x2, 0x97}]}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000900)="4f0aef822188a2cf1a88e96246138463", 0x10) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r5, 0x400, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000a40)='SEG6\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000c40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x12c, r7, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000000}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x1}, 0x80) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000c80)={0xa, 0x2, 0x6}) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000e00)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x40400200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x90, r7, 0x2, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3c9}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3e}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0xf}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x70}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000e40)={&(0x7f0000ffb000/0x2000)=nil, 0x6, 0x2, 0x7, &(0x7f0000ffc000/0x1000)=nil}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001100)={0x70, 0x0, &(0x7f0000001000)=[@exit_looper, @acquire_done={0x40106309, 0x2}, @dead_binder_done, @increfs={0x40046304, 0x3}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000f40)={@fd={0x66642a85, 0x0, r2}, @fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x0, &(0x7f0000000e80)=""/158, 0x9e, 0x1, 0x15}}, &(0x7f0000000fc0)={0x0, 0x18, 0x30}}}], 0x7f, 0x0, &(0x7f0000001080)="88247139c955b2a98830d8da30e4ba34c873f8aca85d898335a3edf7ff9d55a45ef4085a5c9561d4098c49a2d4cade998df5e4bdfbfab787784ba6e0e542b8604b41e38c7cb434be5c014c4e36a07e3bcf00b8f863243b99228c68bb0c9bf3764a934efc4a5f6d4094b4fd2a3da1ec1dd2e177960543a51ca8cb7ebcfe8d99"}) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000001140)=0x0) write$cgroup_pid(r0, &(0x7f0000001180)=r8, 0x12) 13:51:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x1000, 0x1) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000200)={0x37, 0x6, 0x0, {0x4, 0x4, 0xe, 0x0, '/dev/admmidi#\x00'}}, 0x37) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000001c0)={0x0, 0xd707, 0x3b, &(0x7f0000000180)=0x100000000}) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket(0x1e, 0x4, 0x0) epoll_pwait(r2, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x9, &(0x7f00000000c0)={0x1000000000000000}, 0x8) ppoll(&(0x7f00000002c0)=[{r2, 0x11}, {r0, 0x8}, {r0, 0x8040}, {r1, 0x548}, {r2, 0x80}, {r0, 0x4000}, {r1, 0x2040}], 0x162, 0x0, 0x0, 0xffffffb1) 13:51:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 202.677254][T10250] IPVS: ftp: loaded support on port[0] = 21 [ 202.701774][T10248] IPVS: ftp: loaded support on port[0] = 21 [ 202.801628][ C0] hrtimer: interrupt took 62581 ns [ 203.288829][T10249] IPVS: ftp: loaded support on port[0] = 21 [ 203.304939][T10250] chnl_net:caif_netlink_parms(): no params data found [ 203.394963][T10250] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.402225][T10250] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.410521][T10250] device bridge_slave_0 entered promiscuous mode [ 203.420518][T10250] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.427826][T10250] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.436232][T10250] device bridge_slave_1 entered promiscuous mode [ 203.467754][T10250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.479959][T10250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 13:51:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 203.508882][T10250] team0: Port device team_slave_0 added [ 203.537517][T10250] team0: Port device team_slave_1 added [ 203.655404][T10254] IPVS: ftp: loaded support on port[0] = 21 [ 203.784111][T10250] device hsr_slave_0 entered promiscuous mode [ 203.862386][T10250] device hsr_slave_1 entered promiscuous mode [ 203.962216][T10250] debugfs: Directory 'hsr0' with parent '/' already present! 13:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 204.492670][T10250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.510906][ T3363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.519374][ T3363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.535702][T10250] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.542551][T10258] IPVS: ftp: loaded support on port[0] = 21 [ 204.559924][ T3363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.569075][ T3363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.578226][ T3363] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.585385][ T3363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.627294][T10250] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 204.638080][T10250] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 204.684762][T10250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.693405][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.703694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.712724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.721464][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.728622][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.737727][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.747219][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.756700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.766052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.775190][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.784513][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.793633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.802437][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.811499][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.820283][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.853098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.861502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:51:30 executing program 1: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000140)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f00000001c0)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00', 0xe, 0x0) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:system_dbusd_var_lib_t:s0\x00', 0x2c, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00') fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r0) 13:51:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000090607051dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000100)={0x4, 0x1000, &(0x7f0000000200)="5dd4ba50a774326f7fbcd48a746497211b6f914e9970b33b2b21c047aecd05cfbc2afa0a094763fe453882a02b408c12935bf9fcd62a1c1018f1a760fbf02993829a28e1ed95a90011a8a9b617da8884ca0dfac23cdd0e2d14a5ee601d495be9633239c6c9d0f7996837fb6ba90a94c5577d8a4918201a12b8ca05e4868571ab594f4175f8c9ea3436ba430e946216808106ab1ff845124e919569d4746486775ddc53619d85c12bccaa4fd5d43773518efe4a171193dd6d2cdb850d44e263a42d07dc7a47348c785bd767e3f3f82db2e0682ac6f20a5d3bd9b8fbd89180ad901301c52bf8732c625682228fa3f7bc9a0047359c7be8c30706f92f0cec2e60f82c005c41a5e781c2e6d58f4eb4184132e622fa3c7935c2040b5f6253a64d54e360f3a042211c213d43b89caa2ad737760c1170512f4f7bd2b4994fd3cfd948f44d12e0d0409ae594ecbb51754f2e3b2c2325310fe2fbbf41603604b2d0de9709075cf370b7b9b9057273e44a8906e2eca821fc4789accd765eacaade4547bb5ef526cbef2b8cd0965dff0321412a3fe1d3d8d765e632933fe6df4374e76e93fb3ab5ce1f18a5ee70d715cb0dc26b6323cd023a486af8e2578da0b4db1f760b3d2f278b3ffbce8ed724b453d1b424c8a65c8d531e5ed4b041ad1a346830422ece311c372b7eea6e817772da87414c8d4883894b5879f5be8bd09616d78dce355e871d19171311ed07ac22a2fb8aa82dee9257a25dfb31748b5cec4d9111c65957c6fb0113a5f767c81c310a1b9d3761712a75f9d4ad821e4fc31df1a5d16b7ded9f16cc6999cae5384ecbc1877a8005a349f3983193a14790abd57d5f9aab369900de76d984146a3efd35c1781668ffb27899ab8ce16bf4e52733bb92188fd69e16a32b068fecab12aee14cd61fd25a4fb9ef23a21a479ce987055ffe116bbdc27bfcbac5fa8f33a4e78f955b4e70f25d0834780bfc26d20216c676e8561d55c75606c8041961924a8e880b5ee6b33c63bbba70a46015e046a22a98da5725cf22f59e024ce74808e6fbf029c9ca47c2b0d4dd3c30709139ff16e1474eebc7c4eb24d7ebe9de3b218a361f6ceb0e001fc35cd1352babf17e1ae2322fe6ddee4d5af66ed1ea9187aad063c3d041893f793abff0c1f31e0233408017099c9b4bc77472efa1f248d9e574d2e6ad949d8e067e35d5b248525dd1eb317dd7adb6db7932a4a6353d1914632e653b233177dcdd1cbcfa1bf00e4618769e5f8967c56b4c5fa619dbcca802a8389dc3dde56a4f06e3af87f45b550abf60abfeb41caf67c6a76299c0633cffdc89a4d97baf2d4d97e1e8ad0c9cc0b9d193dbec416639e679fabafba530c4b52c4476fa11ffef3809fde8524e52b0e6d7f1f7396751a5a211318986aa9c3030ac3e46a54cda049707a3fbcc03e97e7b87eec53f6510375d43fd66a2fc54d55f021014e2ee09ba4feb91ed5f1f56e2c092ae2aebfb8b621a3e4febe81030f93ac8a3cf3503e30ba694aae7498c2fbe42c857eb982c0183b80daa56f61b40de8c84abb35a9f4be828944bfebd481be80664b50ae9bd3a63d2ec8e9b4fecc65940647e0ed3786256e3ca0b894703306f8ea0c01ab2cc35f8d133a417bd0ec0e8760e35a7a87a279f27dc76d5a0ed884ec6526c558e69ae51e83da5fa7cf08e253b420d2b6d852e9cb50b109bfacb5304848f885e2138155a63e797bf5e8690b12bf8cec99c6558ce3999f1936588869bb99a5477318d298fc6d620a11458dd3f5cf886d2430f8623fff1ca21ad28c4e4cd193444a6a45d45c25983a0b592fe78b1206f7e5b9ab4802abb4b31dfaef87aa76118d78aca44270f164198b66439b8740b21373649e13f9e7df90a5c8c7146da806ace670f5b09dbc88948ea957477c728c4481461f7494669e28892278cd2178c9a8cfba98b12ad14b923eaa7265609909bd577d4cc3a8396495fd17a97b7d85b46b03dba5650a33ec0795a3195b8195e0484ebf35674710bf295d9b02cc31bb78f4db1441672679b4e6577923662333a24520323063c5766737aadc443ecf726738b021a3c0a16e8afb6d037e56868b3f5c38253aff2387fa392da4f95d7c9a1962e52042ac31a99400b6f31318944f138185516f77995aa86a7966faee7febca484865fbfeeeaa65364e11065c3c056be0dbf55d1abdca34130ac5252b74945fb5cbfc1d49af9257547d70f72aea7ecd812e88aba7c310dff94e609151f9066025b9f88ee8451d0077fb4f8bda1f219c7101a4114f2107ec3564cd314effeb5ee03ad2499548c43cf8484e6fcebd428a17c7a0563dafd3e0219434089e7e9b8bb86d00337e778d28231700174d2807c2a7cb421c5fde44e260a068af0d88170499cb0ed770f821c61e9b11a8eb948c76be9ecfc2d3f06b2990cae927b3cc7e9450d103e87d929e502c267741e835075354704647120d42171f6ba01a6730828cea890b84c8025dc9760a19b370ce6ff493fa97aa351a0916fe0f8f880f7dbb047c7810368e0b63aa402982495e92a0ce7120ab5fc74f9fa414d303415ea5349b5e045d5b035927463a0b73d037daf180f98c118900d33ebb9dbcf5dab2b49fb6409a0111a805351ae13ecc34871181638466a26abee751bf1b4a878dc8abb265d6db57887d74b941f79e84a4cc50f6e33499d62a5c310d775ae327d61a44decff2c47be2c73f13fd7b87d7cf8fef20aeff2d0b242d56472dddebee1474f52ea4a928c0f2ba1c56e9610a07b01b70145b95dfda736bd7864a4f4103eeca546e3536693770fda53c0d683b3d4e884cd62bebde2dd790a6f7245d33dff2bf7de972572015ab5155e959acc284fb9c0d10cacb99ce72dbd8c17727111ce5f53c3754cfb84bfec0aedeef6e6732f5ab43200034aeb8740bf4629b452c7db108c109d97ea2c47c0125ca8b01285159c7e9d490c3833f5c7e9b436073df04d14cd1f4646629decdcaaa774f6280d00e6ef1c8213b920988aaf2ad9f944839bab462dbd9bbfa629149594c980d2c50e3c9de079341dc38623647b8dc5cbcb3b02960b0bcaf30b72fc9fe9851f4dbda52c099026ffe7b6013b5e80f0d3bdc2929c8964f5658e7abf3693a66cf191d77b833a681afb65d4a0023c2089c5e3e4b46a006def49678296fcc20147e929db0c2ac1cee760ce6bf7520d1955d919c43dbbd23c89e98fc019c4f2ddf1a4b5d4b1d1ab740814da94c7579a63849fa15619283a311ba85da613f6afdaed00238b9f87a71b2e5e39f7b1fff3bd87faa578ee6c219e780d148972606aa548ec1cc6e55e610245e59b4e9e679533ce9f6a132c88a5a66bf19df07f75ecc64c96a8d82859facc6885f0dc403e7c3b1655ef208df8c2a0644a94bd897841eacfdb91691985d55314cfa674a29e0d90d617b107dbf990e6965a79f274bcb6d9de2e7c08ceb9b2ae1aa48b0c9b7f308aa261efaa69d07604f530a0f9d1818eb02f03c0810a04b5a09d3cd0b525adacaf97209a0ab3053f61c688b0dd5b784dd03f02ae2d307a7a6ea139e7c9275a0c9a77f61ca63db177adcd13a78d986a434cf00e5695bd3baedc2c7bb94102ef2964bad063971c012496bf9aa0eac0681d09f9943f1c58d12980ea79a605dcd16e147ee211617845cd8a6f95f2b1078c52b3930bae7961733a835c35f0f2027cd0ddeb1c291bf2dd3cf828b8e6f604b3c52ace9bc8bacdec5ab153258d841d3d010438bea776377b1d6f196309b0c84b2b6b32fcc81e7a422bc2a4ae351cfe48bf6b9e21a26d7aa69573eafefced34b5fab640e89dc6a45996d9f3ce8d6eb95d71ece01b1eca1d9bd8f8f57c4177e94627a581ca6ef09159edf818ae51388380ac67a974865b2c5131733b5ce2fac9bb4276306ae6a94651e6b995e44c3700bff3db950bceea30c6858639944559c6c64392bac4b4c1d246419eadb5caa8c8f6eb331faed0e93246a0a442bbf67978969695564ba7df1a576a3e91246e41ecfc89a6cedc78f387583e19c951fb3d019fd2b6fea8bd1d8b3913b5ea3d00e90314a5a88caccfeb3533b0c36decf50ab6f459c282a0f1dbec9d51450d024dae4e9e1649c970f2e1e2071d765ab1cba17acd17ef045b4947fedf974bce525bbbafbc09b266d775b78b9ce0a4d0b838a87d68ee0757bbe788cbdba8db58864d9b54cae9c956abfcc94f49ff02cb90bf0de4a624bd8389f446241768417ee55882b666823dfa71eafce854f95242ad6cdab0c46a7b433bdea0e002a44643e1d18598d74b188ee172c1a2d7387d130fd6c0f3b798d10912139ca3e275a02ac5a1e0d8f651e5f3a96f1d92484b36ce4dae9b2a57a71a37df2fdaede7e63de013701c2625462eb6f0565be559b830c64201c9b93acdc8a97d0aa96e02c7df53b01b23970e3a4aac1a4efbce03e7e1c891cb9953476196b6e3428d27e410dc3f272ef8fae0581392e5380ddc103410dfaded0d176ba710de098c4ab20c8708ef00b6a873e9e296d215bcc28dcc6906e0c0036248026f9cbd1451d62ac51f3ddac1aa3a244e46d92480d6d96608d4d0933f7d524e19f4b8641e66c9b6aafb53275914dd4be6aa5c7b2a002cc2418781a4889521cde1d1b43ac390653e14179e0178c96a23702f099de6a8584676758f4540ce053a938e8c012ba7171a39b02b4ca17e901e64a379ed28dd31387bdb6a1c6b3d8a26009cd2b062990176804163e51f85311bd7bf508fbe3b5c2c1f5a229ac20d3ad7689c76989c9a9dadcb124d1413790289ad1562d378673a70f38801749809e1e9dba1f40e61db214110a19496933a94903e7a804487cc74d3c788529736a0a68f9075ae5f3ac45264464fc6354eefd90aa01276ed57fc13a2f1255159eb3db74846a0e03e903348fca1815344e1a90777eeaafc498d00870adb888d2ad0cb612e7e10c87a155cc277b74de1d3e0edcbf06462bd28560048d1d4205504f3fa8fab63d6afb7c572fe0b598d56d4004445ddd694388cb07a1b011fb8e856392047d3117787c4846f7334ee51cd1693db22cf245ce537fdf5f7601a3b7cbb0bae623742222702e26e0148a0bd595075eef3f0a83d96449b5e825570d2831151f936f68653028b6d5e1b5ed0669d036b48a61223812a570b5d3c74e549265debd36cb9227f1f75e7140a1de593b3c61678e2d83bc0959d7d7e6e6a8d476fe2442e65eb3759b2607462ba5cba0569660852c6ccd5be2c9fb696aaac1d7716083618a913d769bcf4f7006a156ad07802740fd5c682904dfa8d8b024be3824ae50f7afd4ed88461df8c1a276b1ab7c8b458c8c5418692a3adb22238d3acc82d8fc0ee0436987440c6b4a0b25559dc1056ba9c6e788df9a9c57488ffcb75606e16d7638c474d73524cde87a5e0215d92a90173459519eb9b089b5ed57c08bee40c93e5293cc4dcc0039dc7aca15c6d62d5d0e8fa49e19e9e52020e3143d02262e2e696bbd4c25d7859d4009c966c0ed3fbdbbb1ca6268ff0e934c5a492d360acddd2718339a0af8256fe227875241095c7db7cf2d15d9b6c4752184d86f950b01f03a09fe2740e71f7367ef5eeabf02c8e67764a3dab88e8709cd18edab6dc9f2c7342292f684b57c839534376bf6b8b298138a156293a3c345b32705e9e6b45100b56f8b067779faed6aecc13ed7819dd20a30b3cc959c9e8ac00eeeff46d4ffe55ff5856b734f2de7205877e2272fd7b7e9af8a5490f6298c3c843a37aaa36fb9372e4b4196e3839f9bc84a04cc9a44fc0dfdb7bf24abcdf4d65918069ae87637562a1c3a5e166b164"}) 13:51:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 205.445293][T10271] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 205.454178][T10271] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 205.486384][T10273] IPVS: ftp: loaded support on port[0] = 21 [ 205.494329][T10271] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 205.502673][T10271] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 13:51:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect(r0, &(0x7f0000006540)=@nl=@unspec, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 13:51:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmsg$key(r1, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="02000000000000000032b3d5baa2ee2f628b482c3d06ada94597b07746974edc3d4dc9542ac7e84933cb"], 0x2a}}, 0x0) 13:51:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) [ 206.347825][T10287] IPVS: ftp: loaded support on port[0] = 21 13:51:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000000080)={{0x77359400}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000140)={0x0, 0x10000, 0x2f}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)) 13:51:31 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='C'], 0x1) close(r2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) r3 = getpid() r4 = getpid() sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1e249af519bb2793}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x31, 0x10, 0x70bd28, 0x25dfdbff, {0x1b}, [@nested={0x30, 0x42, [@generic="97afb3cabe2db3ff532948f974d1ab383163df2b3ba42856498f19d49c318255f77a52", @typed={0x8, 0x4e, @pid=r3}]}, @typed={0x8, 0xb, @pid=r4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040054}, 0x40) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 13:51:31 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='C'], 0x1) close(r2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) r3 = getpid() r4 = getpid() sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1e249af519bb2793}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x31, 0x10, 0x70bd28, 0x25dfdbff, {0x1b}, [@nested={0x30, 0x42, [@generic="97afb3cabe2db3ff532948f974d1ab383163df2b3ba42856498f19d49c318255f77a52", @typed={0x8, 0x4e, @pid=r3}]}, @typed={0x8, 0xb, @pid=r4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040054}, 0x40) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 13:51:32 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='C'], 0x1) close(r2) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) r3 = getpid() r4 = getpid() sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1e249af519bb2793}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x31, 0x10, 0x70bd28, 0x25dfdbff, {0x1b}, [@nested={0x30, 0x42, [@generic="97afb3cabe2db3ff532948f974d1ab383163df2b3ba42856498f19d49c318255f77a52", @typed={0x8, 0x4e, @pid=r3}]}, @typed={0x8, 0xb, @pid=r4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040054}, 0x40) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 13:51:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) 13:51:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) [ 207.127148][T10311] IPVS: ftp: loaded support on port[0] = 21 [ 207.133627][T10308] IPVS: ftp: loaded support on port[0] = 21 13:51:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) 13:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) 13:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) [ 208.103976][T10318] IPVS: ftp: loaded support on port[0] = 21 [ 208.228631][T10321] IPVS: ftp: loaded support on port[0] = 21 [ 208.883974][T10324] IPVS: ftp: loaded support on port[0] = 21 13:51:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) [ 209.191846][T10328] IPVS: ftp: loaded support on port[0] = 21 [ 209.367397][T10324] chnl_net:caif_netlink_parms(): no params data found 13:51:34 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x0, 0x80000001, 0x180, 0x4, 0x8, 0x8000]}, 0x10) [ 209.629885][T10324] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.637122][T10324] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.645552][T10324] device bridge_slave_0 entered promiscuous mode [ 209.655098][T10324] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.662276][T10324] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.670617][T10324] device bridge_slave_1 entered promiscuous mode 13:51:34 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x0, 0x80000001, 0x180, 0x4, 0x8, 0x8000]}, 0x10) [ 209.726617][T10324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.752750][T10324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.781897][T10324] team0: Port device team_slave_0 added [ 209.792826][T10324] team0: Port device team_slave_1 added 13:51:34 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x0, 0x80000001, 0x180, 0x4, 0x8, 0x8000]}, 0x10) [ 209.865861][T10324] device hsr_slave_0 entered promiscuous mode [ 209.902267][T10324] device hsr_slave_1 entered promiscuous mode 13:51:35 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x0, 0x80000001, 0x180, 0x4, 0x8, 0x8000]}, 0x10) [ 209.962036][T10324] debugfs: Directory 'hsr0' with parent '/' already present! 13:51:35 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 210.021123][T10324] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.028324][T10324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.035994][T10324] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.043179][T10324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.063644][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.081400][ T5] bridge0: port 2(bridge_slave_1) entered disabled state 13:51:35 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:35 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 210.254814][T10324] 8021q: adding VLAN 0 to HW filter on device bond0 13:51:35 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 210.310746][T10324] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.319037][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.327238][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.415910][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.425035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.434303][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.441398][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.449598][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:51:35 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 210.458642][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.467342][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.474500][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.482664][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.585893][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.595769][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.605123][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.614255][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.623553][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.632641][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.641561][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.650252][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.659474][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.764520][T10324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.772646][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.868410][T10324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.037775][T10362] IPVS: ftp: loaded support on port[0] = 21 13:51:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) 13:51:36 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000200)=0x3) ioctl$VT_DISALLOCATE(r0, 0x5608) read(r0, &(0x7f0000000040)=""/11, 0xb) r2 = syz_open_pts(r0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)) setsockopt$inet6_tcp_buf(r3, 0x6, 0x1c, &(0x7f0000000080)="8a12425d86bb8ec4fc7d5f09", 0xc) [ 211.460477][T10375] IPVS: ftp: loaded support on port[0] = 21 13:51:36 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:36 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) write(0xffffffffffffffff, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) [ 211.934460][T10386] IPVS: ftp: loaded support on port[0] = 21 13:51:37 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) write(0xffffffffffffffff, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) 13:51:37 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) write(0xffffffffffffffff, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 212.413211][T10394] IPVS: ftp: loaded support on port[0] = 21 13:51:37 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) [ 212.817400][T10403] IPVS: ftp: loaded support on port[0] = 21 13:51:37 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:38 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:38 executing program 1: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r0 = memfd_create(&(0x7f00000001c0), 0x0) write(r0, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) 13:51:38 executing program 1: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r0 = memfd_create(&(0x7f00000001c0), 0x0) write(r0, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:38 executing program 1: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r0 = memfd_create(&(0x7f00000001c0), 0x0) write(r0, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 213.576623][T10419] IPVS: ftp: loaded support on port[0] = 21 13:51:38 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) 13:51:38 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 214.023414][T10431] IPVS: ftp: loaded support on port[0] = 21 13:51:39 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:39 executing program 1: r0 = socket(0x20000000000000a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 214.541026][T10442] IPVS: ftp: loaded support on port[0] = 21 13:51:39 executing program 1: r0 = socket(0x20000000000000a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) 13:51:40 executing program 1: r0 = socket(0x20000000000000a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 215.059312][T10457] IPVS: ftp: loaded support on port[0] = 21 13:51:40 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 215.542270][T10470] IPVS: ftp: loaded support on port[0] = 21 13:51:40 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 215.811992][T10478] IPVS: ftp: loaded support on port[0] = 21 13:51:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:40 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 215.976802][T10485] IPVS: ftp: loaded support on port[0] = 21 13:51:41 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:41 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:41 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:41 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:41 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 216.966285][T10502] IPVS: ftp: loaded support on port[0] = 21 13:51:42 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(0x0, 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:42 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(0xffffffffffffffff, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 217.371639][T10510] IPVS: ftp: loaded support on port[0] = 21 [ 217.766059][T10510] chnl_net:caif_netlink_parms(): no params data found [ 217.846559][T10510] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.855010][T10510] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.863304][T10510] device bridge_slave_0 entered promiscuous mode [ 217.873587][T10510] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.880780][T10510] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.889104][T10510] device bridge_slave_1 entered promiscuous mode [ 217.940616][T10510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.954173][T10510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.324411][T10510] team0: Port device team_slave_0 added [ 218.514051][T10510] team0: Port device team_slave_1 added [ 218.995805][T10510] device hsr_slave_0 entered promiscuous mode [ 219.272217][T10510] device hsr_slave_1 entered promiscuous mode [ 219.472086][T10510] debugfs: Directory 'hsr0' with parent '/' already present! [ 219.622612][T10510] 8021q: adding VLAN 0 to HW filter on device bond0 13:51:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:44 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(0xffffffffffffffff, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 219.685286][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.693758][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.715869][T10510] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.790332][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.796674][T10527] IPVS: ftp: loaded support on port[0] = 21 [ 219.799602][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.813262][T10519] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.820381][T10519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.828580][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.837636][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.846394][T10519] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.853545][T10519] bridge0: port 2(bridge_slave_1) entered forwarding state 13:51:45 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(0xffffffffffffffff, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 219.983395][T10530] IPVS: ftp: loaded support on port[0] = 21 13:51:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 220.076973][T10510] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 220.087377][T10510] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.120188][T10510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.132159][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.140653][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.150420][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.160080][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.169494][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.178653][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.188009][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.197061][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.205873][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.215034][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.223909][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.278501][T10537] IPVS: ftp: loaded support on port[0] = 21 [ 220.289962][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.298481][T10519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:51:45 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 220.530374][T10545] IPVS: ftp: loaded support on port[0] = 21 13:51:45 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:46 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:46 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 221.409909][T10559] IPVS: ftp: loaded support on port[0] = 21 [ 221.541058][T10565] IPVS: ftp: loaded support on port[0] = 21 [ 221.579030][T10562] IPVS: ftp: loaded support on port[0] = 21 13:51:46 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:46 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540), 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:46 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:47 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:47 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:47 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:47 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 222.451386][T10582] IPVS: ftp: loaded support on port[0] = 21 [ 222.565481][T10586] IPVS: ftp: loaded support on port[0] = 21 [ 222.633452][T10592] IPVS: ftp: loaded support on port[0] = 21 13:51:48 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) 13:51:48 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:48 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:48 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 223.610929][T10610] IPVS: ftp: loaded support on port[0] = 21 [ 223.753537][T10615] IPVS: ftp: loaded support on port[0] = 21 [ 223.926804][T10620] IPVS: ftp: loaded support on port[0] = 21 13:51:49 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) 13:51:49 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 224.655423][T10620] chnl_net:caif_netlink_parms(): no params data found [ 224.770850][T10620] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.778115][T10620] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.786456][T10620] device bridge_slave_0 entered promiscuous mode [ 224.818483][T10620] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.825667][T10620] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.834062][T10620] device bridge_slave_1 entered promiscuous mode [ 224.892588][T10620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.918278][T10620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.984439][T10620] team0: Port device team_slave_0 added [ 224.993081][T10620] team0: Port device team_slave_1 added [ 225.185151][T10620] device hsr_slave_0 entered promiscuous mode [ 225.212340][T10620] device hsr_slave_1 entered promiscuous mode [ 225.263314][T10620] debugfs: Directory 'hsr0' with parent '/' already present! [ 225.330794][T10620] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.337983][T10620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.345643][T10620] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.352822][T10620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.439305][T10620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.504151][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.513892][ T3900] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.527119][ T3900] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.538341][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 225.562167][T10620] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.685343][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.695324][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.704134][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.711250][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.719467][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.728516][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.737254][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.744402][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.925136][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.934726][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.944204][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.954079][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.963200][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.972531][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.981659][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.990386][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.002953][ T3900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.016722][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.025988][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.038077][T10620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:51:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x7, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'team_slave_0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="1200"/16]}) 13:51:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:51 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x19, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 226.180712][T10620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.196311][T10638] IPVS: ftp: loaded support on port[0] = 21 13:51:51 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 226.679150][T10647] IPVS: ftp: loaded support on port[0] = 21 13:51:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) personality(0xffffffffffffffff) 13:51:52 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 227.546950][T10655] IPVS: ftp: loaded support on port[0] = 21 13:51:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x3f, 0x40) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000325bd7000fddbdf2502421600240007000c000300010000800000000008771300060000000c00030001000000000000000c0009000800010005000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x80) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000002c0)=[{&(0x7f0000000280)="39000000130009006900000000000000ab0080482600000046000107000000141900000010000000d84b9308000000000000ef38bf461e59d7", 0x39}], 0x1) 13:51:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffff, 0x400) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}]}, 0x2c, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000440)={@initdev, @dev, 0x0}, &(0x7f0000000480)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000006c0)={@loopback, @loopback, 0x0}, &(0x7f0000000700)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'veth1_to_bond\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000a00)={0x220, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x8c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x170, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r9}}}]}}]}, 0x220}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000001) 13:51:52 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0xffffffffffffff8d) [ 227.927374][T10673] IPVS: ftp: loaded support on port[0] = 21 13:51:53 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, 0x0) 13:51:53 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, 0x0) 13:51:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x880, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/249, 0xf9}], 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8464e9869e9572be, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x42f640a5, 0x9, 0xca, 0x7fff, 0x5, 0x7}) [ 228.360365][T10691] IPVS: ftp: loaded support on port[0] = 21 13:51:53 executing program 2: unshare(0xe000e00) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1000, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) 13:51:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xa6) mmap(&(0x7f0000a49000/0x2000)=nil, 0x2000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x1000001, 0x100132, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x1f, 0x0, &(0x7f0000000180)=0x233) 13:51:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x80040000}, 0xc) 13:51:55 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r1 = memfd_create(&(0x7f00000001c0), 0x0) write(r1, &(0x7f0000000540)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x19, 0xffffffffffffffff, 0x0) 13:51:55 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000080), 0x0) 13:51:55 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'yam0\x00', {0x2, 0x4e22, @loopback}}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000080)={0x9, 0x7d}) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000000c0)={0x9, 0x2, 0xcd5, 0x2}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x10) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000140)={0x7f, 0xef06}) truncate(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f00000001c0)={0x1, 0xffffffff, 0x1}) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000200)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000340)=0x0) fcntl$setown(r0, 0x8, r1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xe5, "e7e3d5d8096ae780e92de212887102be3a026ccef4567ab82ca748de18e915335e47fdc1534608feda625dfeb6f1913beb1f12252d3644fe862c0bd2dcb309f738574a4f56391e04a61a18a9608477c7fc7a0147126ea3311750ca0bc0a552b8bc1812e83676662135f0ae8b025153809b9f55a94641f8df050eb77edfb2ae74f22f0ff3ebf0515eaf4bba101bd21ce39d5d71529f2b71c32eb9dab496f126808e9b25aa056f1cb87068a6d60506f3bbd5b4dce1b1ea335f206959b773687d023415f95f42d0db899bc05f7f883e7676f851dde5b5bb8575038e29090a3d30ed9141d942bf"}, &(0x7f0000000480)=0xed) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000004c0)={r2, @in={{0x2, 0x4e21, @rand_addr=0x8}}, 0x3, 0x3}, 0x90) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000580)={0x40000000}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000000840)={&(0x7f0000000640)={0x1ec, r3, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7e8f9c51}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000804) ioctl(r0, 0x800, &(0x7f00000008c0)="da7911ad5e1d3b95b19742ed87320b91fbfeec88916262a69d9d1f23f70f4b69da4c2573b637ede6f1d8ea9e") r4 = syz_open_dev$sndtimer(&(0x7f0000000900)='/dev/snd/timer\x00', 0x0, 0x60000) poll(&(0x7f0000000940)=[{r4, 0x200}, {r0, 0x8010}, {r0, 0x4000}, {r4, 0x10c0}, {r0, 0x9002}, {r4, 0x40}, {r0, 0x2040}, {r0, 0x2000}, {r0, 0x100}], 0x9, 0xfffffffffffff429) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000009c0)={r2, @in={{0x2, 0x4e20, @empty}}, 0xffffffff, 0x3}, &(0x7f0000000a80)=0x90) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000ac0)) truncate(&(0x7f0000000b00)='./file0\x00', 0x2) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000b40)={0x1, 0xfffffffffffffffd}) r5 = dup3(r0, r4, 0x80000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000bc0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r5, &(0x7f0000000cc0)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c00)={0x44, r6, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ff}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4000004) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000d00)=0xffffffffffff0001) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000d40)=0x1) 13:51:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) [ 230.647827][T10734] IPVS: ftp: loaded support on port[0] = 21 13:51:55 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, 0x0, 0x2b4) 13:51:55 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x5100, 0x0) [ 231.228018][T10755] IPVS: ftp: loaded support on port[0] = 21 13:51:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, 0x0) 13:51:56 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x2, 0x0, 0x0) 13:51:56 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045104, 0x0) 13:51:56 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2, 0x9}}, 0x24) 13:51:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 231.378225][T10755] chnl_net:caif_netlink_parms(): no params data found 13:51:56 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000480)=@v2={0x5}, 0xa, 0x0) [ 231.490134][T10755] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.497813][T10755] bridge0: port 1(bridge_slave_0) entered disabled state 13:51:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 231.542563][T10755] device bridge_slave_0 entered promiscuous mode [ 231.550677][T10767] IPVS: ftp: loaded support on port[0] = 21 [ 231.570284][T10755] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.577572][T10755] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.585983][T10755] device bridge_slave_1 entered promiscuous mode [ 231.623080][T10755] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.705725][T10755] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.965885][T10755] team0: Port device team_slave_0 added [ 231.974345][T10755] team0: Port device team_slave_1 added [ 232.064823][T10755] device hsr_slave_0 entered promiscuous mode [ 232.102214][T10755] device hsr_slave_1 entered promiscuous mode [ 232.141781][T10755] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.164248][T10755] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.171312][T10755] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.178922][T10755] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.186044][T10755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.229716][T10755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.250678][T10260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.259178][T10260] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.279452][T10260] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.290587][T10260] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 232.309742][T10755] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.320536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.330014][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.337168][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.348371][T10677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.357304][T10677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.366634][T10677] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.373822][T10677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.387531][T10677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.413316][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.422691][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.431510][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.440244][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.448992][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.457882][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.466285][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.476134][T10724] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.489917][T10755] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 232.502965][T10755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.511417][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.520281][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.547167][T10755] 8021q: adding VLAN 0 to HW filter on device batadv0 13:51:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000040)=0x2ac) 13:51:58 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) unshare(0x4000400) ioctl$FS_IOC_SETFLAGS(r0, 0x7706, 0x0) 13:51:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x3, 0x4) 13:51:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:51:58 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0xc0045406, 0x0) 13:51:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(0xffffffffffffffff, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:58 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev, 0x8711}}, 0x24) 13:51:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x1c, 0x4) [ 233.290985][T10811] IPVS: ftp: loaded support on port[0] = 21 13:51:58 executing program 5: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000440)) socket$xdp(0x2c, 0x3, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 13:51:58 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x40045408, 0x0) 13:51:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:51:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000002c40)={0x0, 0x0, &(0x7f0000002c00)={&(0x7f0000002980)={0x20, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 13:51:58 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) close(r0) close(r0) 13:51:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:51:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001840)=[{0x0}, {0x0}, {&(0x7f0000000280)}], 0x3}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000580)='ip6_vti0\x00') 13:51:58 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 13:51:58 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 13:51:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(0xffffffffffffffff, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:51:59 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) [ 234.248163][T10863] IPVS: ftp: loaded support on port[0] = 21 13:51:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00ba2300850000001f000000b7000000000000009500000000000000581a5fdbe28d37a549237e226ee5870a901ea65ea4b6a8836185ca7f26e2d3db95ea29886c79b19d16dc1cdae0a88fd0c321d4420e1966a3f3ebe00ef871007944b37516ba8976bcdcbff8de2b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="3d6ee2e04b91ab10f30f9bbe0800", 0x0, 0x4000}, 0x28) 13:51:59 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f00000000c0)='cpu.stat\x00', 0x9) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0207000902000000a8a9897bbb73ec91"], 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8}]}, 0x30}}, 0x0) 13:51:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') mknod(&(0x7f0000000000)='./bus\x00', 0xffe, 0x0) execve(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) 13:51:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:51:59 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x0) ftruncate(r0, 0x0) 13:51:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:51:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:51:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(0xffffffffffffffff, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:51:59 executing program 5: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 234.794997][T10898] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:51:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 234.918927][T10902] IPVS: ftp: loaded support on port[0] = 21 13:52:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000033e, 0x0) 13:52:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 13:52:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:01 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x2711, @host}, 0x10) 13:52:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 13:52:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 236.354406][T11089] IPVS: ftp: loaded support on port[0] = 21 13:52:01 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) 13:52:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 236.404814][T11093] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:52:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000033e, 0x0) 13:52:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:02 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x5) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 13:52:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x1c5) dup3(r0, r1, 0x0) 13:52:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 237.338215][T11121] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:52:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 237.511318][T11126] IPVS: ftp: loaded support on port[0] = 21 13:52:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 13:52:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:02 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x550b, 0x0) 13:52:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) 13:52:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:03 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400, 0x0) mq_open(&(0x7f0000000100)='/dev/vsock\x00', 0x800, 0x1a0, &(0x7f0000000200)={0x101, 0x3, 0x0, 0xc20, 0x20, 0x3f, 0x0, 0x4}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000280)) 13:52:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 238.558253][T11167] IPVS: ftp: loaded support on port[0] = 21 13:52:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 13:52:04 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x5) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 13:52:04 executing program 0: getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 239.464998][T11212] IPVS: ftp: loaded support on port[0] = 21 13:52:04 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2d, 'pids'}]}, 0x6) 13:52:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 13:52:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:04 executing program 0: getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 239.832288][T11238] IPVS: ftp: loaded support on port[0] = 21 13:52:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 13:52:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r1, 0x0, 0x0, 0x2000002) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000300)={0x0, r1, 0x7}) 13:52:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:05 executing program 0: getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 240.299332][T11257] IPVS: ftp: loaded support on port[0] = 21 [ 240.316770][T11259] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:52:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)) mlock(&(0x7f0000003000/0x2000)=nil, 0x2000) 13:52:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:05 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:05 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)='bpf\x00') [ 240.756920][T11289] IPVS: ftp: loaded support on port[0] = 21 13:52:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() clone(0x3ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pselect6(0x344, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xd2}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 13:52:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/240, 0xf0}], 0x1, 0x0) 13:52:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 241.175207][T11306] IPVS: ftp: loaded support on port[0] = 21 13:52:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:06 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) msgget(0x0, 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c748) setgid(0x0) 13:52:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:06 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local}, 0xc) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c748) setgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL_GET(0x22) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000540)={0x3}) 13:52:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 241.798745][T11338] IPVS: ftp: loaded support on port[0] = 21 13:52:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:06 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x208200) io_setup(0x2, &(0x7f0000000140)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x8000, 0x80010001}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000080)='./bus\x00', 0x0) 13:52:07 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000004000000000000002001300020000000000000000000000030006000000c00002000000e000000100000000000000000200010000000000000000020000500003000500000000000200000040a3a23be0000001000000d8e46df29749659491fa00000000007c9e3ccb51b4475e0cfe77623bd3c6594a939aa425b13d52cba3c48a16d6e4d4f41f10d503c52bdd883fd99aa91c02669060e410223b60e5d275856df9527c288a1c6a5b847699d9f5fce4e1121f39a863bcda59b703f2d0fe5297ba831882683b28f31ad4c1be"], 0x60}, 0x1, 0x2000000000000000}, 0x0) 13:52:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 242.457442][T11373] IPVS: ftp: loaded support on port[0] = 21 13:52:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000680)=""/156, 0x9c}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000001700)=[{&(0x7f0000000080)=""/234, 0xea}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00546) shutdown(r5, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) recvmsg(r8, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)=""/178, 0xb2}], 0x1}, 0x42) r9 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r9, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r8, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r10, &(0x7f0000001880)=[{&(0x7f00000001c0)=""/83, 0x53}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r9, 0x0) shutdown(r6, 0x0) shutdown(r3, 0x0) 13:52:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x2, 0x0, 0x800e00515) shutdown(r1, 0x0) fcntl$getflags(r2, 0x0) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:52:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 242.829636][T11405] IPVS: ftp: loaded support on port[0] = 21 13:52:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b93", 0x3}], 0x1}, 0x8000) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000a80)="d09a", 0x2}], 0x1}, 0x0) 13:52:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000004c0)="45453b30339bbebf070f89f176135f94bd9ef3ae1e9da0d5156508fe6332d723beb8", 0x22}, {&(0x7f0000000640)="c30a40f7a5c321d4d2331ad8ff75b8534879", 0x12}, {&(0x7f00000006c0)="199e3b1f4800332fa49d88e728eff2c7160b22f1eb40b5b21849e35aafc17339d836f84b50ac2169b68fee606a5eac04fb9631234654589fceea96f47aa3d021502155adae5a80e0ea8aceaebbdab87c9f30ff4909be8bb2689bd3df03e9373c43058b54c7d5622a761325aa3317d6dbdcae3c1012ff927a36d357d9c8d331403fb2eea727e9264e565c4b740d3326f11cc3fbfe90", 0x95}], 0x3}}], 0x1, 0x0) sendto$inet(r0, &(0x7f0000001340)="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", 0x2d8, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00'}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 13:52:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 243.500296][T11445] IPVS: ftp: loaded support on port[0] = 21 13:52:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x7ff, 0x4) sendmmsg(r1, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 13:52:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) [ 243.922985][T11479] IPVS: ftp: loaded support on port[0] = 21 13:52:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:09 executing program 2: 13:52:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:09 executing program 5: 13:52:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 244.462822][T11505] IPVS: ftp: loaded support on port[0] = 21 13:52:09 executing program 5: 13:52:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff020300000000000000000000000001e000000100000000000000000000000000000000000000000a003e0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eb00"/112], 0xb8}}, 0x0) 13:52:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) pwritev(r0, &(0x7f0000003000)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:52:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x2, 0x0, 0x800e00515) shutdown(r1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x3) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:52:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 244.886106][T11532] IPVS: ftp: loaded support on port[0] = 21 13:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 5: 13:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:10 executing program 2: 13:52:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:10 executing program 5: 13:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 2: 13:52:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 5: 13:52:10 executing program 2: [ 245.645092][T11583] IPVS: ftp: loaded support on port[0] = 21 13:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 2: 13:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:11 executing program 5: 13:52:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:11 executing program 2: 13:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:11 executing program 5: 13:52:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 246.143961][T11618] IPVS: ftp: loaded support on port[0] = 21 13:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:11 executing program 2: 13:52:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:11 executing program 5: 13:52:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:11 executing program 2: 13:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:11 executing program 5: 13:52:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:11 executing program 2: [ 246.638283][T11651] IPVS: ftp: loaded support on port[0] = 21 13:52:11 executing program 5: 13:52:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:12 executing program 2: 13:52:12 executing program 5: 13:52:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:12 executing program 2: 13:52:12 executing program 5: 13:52:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 247.100756][T11676] IPVS: ftp: loaded support on port[0] = 21 13:52:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:12 executing program 2: 13:52:12 executing program 5: 13:52:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:12 executing program 2: 13:52:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:12 executing program 5: 13:52:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:12 executing program 2: 13:52:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:12 executing program 5: [ 247.632134][T11712] IPVS: ftp: loaded support on port[0] = 21 13:52:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:12 executing program 2: 13:52:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:12 executing program 2: 13:52:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:13 executing program 5: 13:52:13 executing program 2: 13:52:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:13 executing program 2: [ 248.271500][T11746] IPVS: ftp: loaded support on port[0] = 21 13:52:13 executing program 5: 13:52:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:14 executing program 5: 13:52:14 executing program 2: 13:52:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 249.105592][T11781] IPVS: ftp: loaded support on port[0] = 21 13:52:14 executing program 5: 13:52:14 executing program 2: 13:52:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 2: 13:52:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:14 executing program 2: 13:52:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 5: 13:52:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:14 executing program 2: [ 249.807424][T11813] IPVS: ftp: loaded support on port[0] = 21 13:52:14 executing program 5: 13:52:15 executing program 5: 13:52:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:15 executing program 2: 13:52:15 executing program 5: 13:52:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:15 executing program 2: [ 250.476676][T11846] IPVS: ftp: loaded support on port[0] = 21 13:52:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:15 executing program 5: 13:52:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:15 executing program 2: 13:52:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:16 executing program 5: 13:52:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:16 executing program 2: 13:52:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) [ 251.229727][T11871] IPVS: ftp: loaded support on port[0] = 21 13:52:16 executing program 5: 13:52:16 executing program 2: 13:52:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:16 executing program 5: 13:52:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:16 executing program 2: 13:52:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:16 executing program 5: 13:52:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:16 executing program 5: 13:52:16 executing program 2: [ 252.002622][T11912] IPVS: ftp: loaded support on port[0] = 21 13:52:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:17 executing program 5: 13:52:17 executing program 2: 13:52:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:17 executing program 2: 13:52:17 executing program 5: 13:52:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:17 executing program 2: 13:52:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:17 executing program 5: 13:52:17 executing program 2: [ 252.599774][T11942] IPVS: ftp: loaded support on port[0] = 21 13:52:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(0xffffffffffffffff, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:18 executing program 5: 13:52:18 executing program 2: 13:52:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:18 executing program 2: [ 253.344163][T11964] IPVS: ftp: loaded support on port[0] = 21 13:52:18 executing program 5: 13:52:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:18 executing program 2: 13:52:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(0xffffffffffffffff, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:19 executing program 2: 13:52:19 executing program 5: 13:52:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 254.282341][T12004] IPVS: ftp: loaded support on port[0] = 21 13:52:19 executing program 2: 13:52:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:19 executing program 5: 13:52:19 executing program 2: 13:52:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:52:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(0xffffffffffffffff, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:19 executing program 5: 13:52:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:19 executing program 2: 13:52:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:52:19 executing program 2: 13:52:20 executing program 5: [ 254.905493][T12027] IPVS: ftp: loaded support on port[0] = 21 13:52:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:52:20 executing program 2: 13:52:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000040c0)=[{{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001400)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) 13:52:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x210, 0x0, 0x0) 13:52:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:52:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) [ 255.760976][T12070] IPVS: ftp: loaded support on port[0] = 21 13:52:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:52:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x8001, @remote, 0x9}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x1a5) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000200), 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x107400, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x3, 0x52, &(0x7f00000000c0)="394ff6", &(0x7f0000000100)=""/82, 0x5}, 0x28) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffff001, 0xff, 0x4, 0x0, 0x0, 0x100000001, 0x90010, 0xc, 0x8081, 0x81, 0xf7, 0x80, 0x3, 0x7, 0x8, 0x857b, 0x9, 0x9, 0xffffffff, 0x0, 0x4, 0x8, 0x1, 0x9, 0x0, 0x0, 0x6, 0xac, 0x0, 0x8, 0x2, 0x9, 0x5, 0x0, 0xfffffffffffff800, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000240), 0x3}, 0x20800, 0x6, 0x9, 0x2, 0x0, 0x101, 0x5d98}, r3, 0xc, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@fragment={0x6c, 0x0, 0x8000, 0x8}, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) r4 = inotify_add_watch(r2, &(0x7f0000000300)='./file0\x00', 0x100) inotify_rm_watch(r1, r4) 13:52:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:52:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:52:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff3d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000008000000b7000000bf188b6295000000000000004e628fb5a4e47f6ce4c59d81dec4bd9cbb0ecc49bd5c3252747764a0a3e9bfd1586e13cde58b6a46c611c2e2d56325292c28cc9dfa454b705edf2f55efabd14fdc99a86ead4e9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", 0x0}, 0x28) 13:52:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:52:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:21 executing program 5: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) io_uring_setup(0x31e, &(0x7f0000000180)={0x0, 0x0, 0x2}) 13:52:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) [ 256.583537][T12110] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 13:52:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:52:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) [ 256.686947][T12115] IPVS: ftp: loaded support on port[0] = 21 13:52:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000014008105e00f80ecdb4cb92e0a68022c14000000160001008e7948f328995a017c7b58510600000001ff", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 13:52:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000002480)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea1\x9a`V\xf0\xf30\xaa\r3z\x065\xd9\xf4EwM\t\xe0\xf6n\x98\xaeH\xfb\xbb\xa9\xf9\xbcvY\x12(-\xb1\xd5\xf8\xff\xff\xff\x9f\x90|\xeb\x81\x93a\x00\xfe\x98{\x945\xdb\\=$\x0e\x86\xdbr\xd4\xd3\xc2\x99hV\x97\x1al\"\xe0v3\xfavh\x949r\xf3\xe7\x05W\x97\xb9\xa4\xf2\xe1\x8bx\xd7\xb4\xa5 \xd298\xf9*\xfa\xf3\xde;i(\xb0\x12\x1e\xc7(\xaf\xe4ME>\x89\xd2o#=\xec\xd5y|D\xe4\xe7\x04\x9a\x14-\xaf\xdd\xc0\xae=\x89\xbeX\xf4d\xd8\xc5\xfc\xc3\x89S6o\x06DM\xa3\xca$0\x96\xe3\x8f\xde\xa8\x99\x94\xb02T!\xc5\x1c\'\x15NRK\x8e\x10SB1<\x98i3\xce\xec,\xfe\xde\xadA\x95h\x17\xcf\xab<\x10\x10\x03\xb2^(C\x0eY \xa9\xf6\xdaoy\x90&.\x94!Z$\x14R\x80\xcb?\xe5\x18\xaaV\xef\xf9Ke`EGGn\xe6\xbd\xeb', 0x200002, 0x0) fchdir(r1) open(&(0x7f0000000240)='./file1\x00', 0x40a00, 0x0) 13:52:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:52:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:22 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x5bb, @mcast2, 0x5}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080), 0x4) fcntl$addseals(r0, 0x409, 0x1) flistxattr(r0, &(0x7f00000000c0)=""/171, 0xab) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) pread64(r0, &(0x7f0000000280)=""/34, 0x22, 0x1ef) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000002c0)={0x80000001}) r1 = shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffb000/0x2000)=nil) shmat(r1, &(0x7f0000ffb000/0x1000)=nil, 0x1000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000340)=0x10) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000600)=ANY=[@ANYBLOB="3b0e02270000000000000000000000000000000000000001ff010006000000000000f3ff00000001ff010000005dca0000000000000000000001ff0200000000000000000000000000010700000000000000000000000000002afe800000000000000028ff020000b1656f5dbf80a98c00000001000000000000389151ab44a3854982d1f3df2312a14cce236ac755249dcb6244e93bff676718db68844468f90818dcaa95d88fb4de87aed44a14e1379248f57f9e61d680807c6c838ac07285d15cba34d926881153f2c1db"], 0x1) renameat(r0, &(0x7f0000000400)='./file0\x00', r0, &(0x7f0000000440)='./file0\x00') readahead(r0, 0x617, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000480)) r2 = msgget(0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000007c0)={r0, 0x0, 0x4000000000, 0xfffffffffffffff7, 0x2}) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) semop(r2, &(0x7f00000004c0)=[{0x3, 0x801, 0x800}], 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) msgrcv(r2, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1, 0x3, 0x800) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000580)={0x9, 0xf, 0x1}) fcntl$setlease(r0, 0x400, 0x0) 13:52:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:52:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0\x00', 0x4) 13:52:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2) getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000000)) 13:52:23 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 13:52:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:52:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fd\x00') getdents(r0, &(0x7f0000000400)=""/46, 0x2e) getdents(r0, &(0x7f0000000000)=""/129, 0x81) 13:52:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) [ 258.963037][T12174] IPVS: ftp: loaded support on port[0] = 21 13:52:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) 13:52:24 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) semctl$GETVAL(0x0, 0x0, 0xc, 0x0) 13:52:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:52:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:24 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 13:52:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:52:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) syz_emit_ethernet(0x140, &(0x7f000070aef1)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 13:52:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:52:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:24 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 13:52:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:25 executing program 5: 13:52:25 executing program 1: 13:52:25 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 13:52:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(0x0, 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:25 executing program 1: 13:52:25 executing program 5: 13:52:25 executing program 2: 13:52:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) [ 260.451875][T12268] IPVS: ftp: loaded support on port[0] = 21 13:52:25 executing program 5: 13:52:25 executing program 5: 13:52:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:25 executing program 2: 13:52:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(0x0, 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:26 executing program 2: 13:52:26 executing program 1: 13:52:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:26 executing program 5: 13:52:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:26 executing program 2: 13:52:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000e400d60000000004000000000058000000000000000000"], &(0x7f0000000000)=0x28) accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 13:52:26 executing program 1: clock_gettime(0x97b591e2de498f0b, 0x0) [ 261.341492][T12298] IPVS: ftp: loaded support on port[0] = 21 13:52:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:26 executing program 2: 13:52:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:27 executing program 5: 13:52:27 executing program 1: 13:52:27 executing program 2: 13:52:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(0x0, 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:27 executing program 2: 13:52:27 executing program 1: 13:52:27 executing program 5: 13:52:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 262.306045][T12340] IPVS: ftp: loaded support on port[0] = 21 13:52:27 executing program 2: 13:52:27 executing program 1: 13:52:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:27 executing program 5: 13:52:27 executing program 2: 13:52:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:28 executing program 5: 13:52:28 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) unshare(0x4000400) ioctl$FS_IOC_SETFLAGS(r0, 0x7709, 0x0) 13:52:28 executing program 1: 13:52:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:28 executing program 1: 13:52:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 263.084049][T12371] IPVS: ftp: loaded support on port[0] = 21 13:52:28 executing program 2: 13:52:28 executing program 1: 13:52:28 executing program 5: 13:52:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:29 executing program 2: 13:52:29 executing program 5: 13:52:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:29 executing program 1: 13:52:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 264.204750][T12395] IPVS: ftp: loaded support on port[0] = 21 13:52:29 executing program 5: 13:52:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:29 executing program 2: 13:52:29 executing program 1: 13:52:29 executing program 5: 13:52:29 executing program 2: 13:52:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:30 executing program 1: 13:52:30 executing program 2: 13:52:30 executing program 5: 13:52:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) [ 265.201307][T12429] IPVS: ftp: loaded support on port[0] = 21 13:52:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:30 executing program 2: 13:52:30 executing program 1: 13:52:30 executing program 5: 13:52:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:30 executing program 2: 13:52:30 executing program 1: 13:52:30 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/anycast6\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 13:52:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) writev(r0, &(0x7f0000001540)=[{&(0x7f00000002c0)='$', 0x1}, {0x0}], 0x2) 13:52:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x0) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:31 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) 13:52:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x2, 0x0) 13:52:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 13:52:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r1, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 13:52:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:52:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) [ 266.178433][T12486] IPVS: ftp: loaded support on port[0] = 21 13:52:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/current\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/73, 0x49}], 0x1, 0x0) 13:52:31 executing program 2: 13:52:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) 13:52:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:52:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000015, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) 13:52:31 executing program 5: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x2) 13:52:31 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x54) 13:52:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) 13:52:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x0) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 266.919958][T12523] IPVS: ftp: loaded support on port[0] = 21 13:52:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0xffffffffffffff96, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 13:52:32 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{&(0x7f0000000280)="f6", 0x1}], 0x1) 13:52:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:52:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0xf0ff7f) 13:52:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x0, 0x2, 0x0) 13:52:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:52:32 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000080), &(0x7f00000000c0), 0x0) 13:52:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x63) 13:52:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:52:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x68) 13:52:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x0) semget(0x0, 0x0, 0x80) personality(0xffffffffffffffff) 13:52:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000015, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 13:52:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:52:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x0, 0x2, 0x0) 13:52:32 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) unshare(0x4000400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x20, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200), 0x0) 13:52:32 executing program 2: unshare(0x24000400) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}, {r1}], 0x2, 0x0) 13:52:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x0, 0x2, 0x0) [ 267.828113][T12581] IPVS: ftp: loaded support on port[0] = 21 13:52:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:52:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x0, 0x0) 13:52:33 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) write$binfmt_script(r0, &(0x7f0000000500)=ANY=[], 0xfffffd3b) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffffffffffff8a) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f00000004c0)=0x9) r4 = syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000480)={0x2, 'syz_tun\x00', 0x1}, 0x18) write$P9_RLOPEN(r1, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r3, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000380)=0x6, 0xfd6d) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000400)=[@in6={0xa, 0x4e24, 0x7e0fdecf, @mcast2}, @in6={0xa, 0x4e24, 0x4ca, @mcast1, 0xfffffffffffffffa}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x3, @local, 0x100000000}, @in={0x2, 0x4e21, @local}], 0x74) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f00000003c0)={0x800, "45343e2dcb31b8b5c3be52e072b800a41540f59a91ae9e5c6ea47b016ce0f3a5", 0x5, 0x1}) r6 = signalfd4(r2, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) renameat2(0xffffffffffffffff, 0x0, r1, 0x0, 0x0) dup(r6) 13:52:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 13:52:33 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x0, 0x0, 0x1000}) 13:52:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:52:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x0) personality(0xffffffffffffffff) 13:52:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x0, 0x0) 13:52:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:52:33 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="9dae77ca4824", @multicast1, @remote, @loopback}}}}, 0x0) 13:52:33 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) write$binfmt_script(r0, &(0x7f0000000500)=ANY=[], 0xfffffd3b) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffffffffffff8a) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f00000004c0)=0x9) r4 = syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000480)={0x2, 'syz_tun\x00', 0x1}, 0x18) write$P9_RLOPEN(r1, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r3, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000380)=0x6, 0xfd6d) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000400)=[@in6={0xa, 0x4e24, 0x7e0fdecf, @mcast2}, @in6={0xa, 0x4e24, 0x4ca, @mcast1, 0xfffffffffffffffa}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x3, @local, 0x100000000}, @in={0x2, 0x4e21, @local}], 0x74) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f00000003c0)={0x800, "45343e2dcb31b8b5c3be52e072b800a41540f59a91ae9e5c6ea47b016ce0f3a5", 0x5, 0x1}) r6 = signalfd4(r2, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) renameat2(0xffffffffffffffff, 0x0, r1, 0x0, 0x0) dup(r6) 13:52:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) [ 268.724077][T12628] IPVS: ftp: loaded support on port[0] = 21 13:52:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:52:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:52:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000240), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0, 0x0, 0x0, 0x314}}], 0x400000000000440, 0x0, 0x0) 13:52:34 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ecryptfs\x00', 0x0, 0x0) 13:52:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:52:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:34 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="16ad2dc4e46ada90df19c60bad38e39bbd8eb6a315d9d0b29c8903424a8ca69d5eafdfed4af673d6e806424a4c8478deb885fc297fa2b2ea0e27107f00f13f2e02e7e4773f19077a255423843edd8157b958d842f73a6b454a84652422c6fd30ad13c36bf4271cd6ae503655d3ce", 0x6e}, {&(0x7f0000001540)="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", 0xf93}], 0x2) 13:52:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:52:34 executing program 4: socket$bt_cmtp(0x1f, 0x3, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x200000000002) 13:52:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x0) personality(0xffffffffffffffff) [ 269.599496][T12665] IPVS: ftp: loaded support on port[0] = 21 13:52:34 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) unshare(0x4000400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200), 0x0) 13:52:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}]}, &(0x7f00000000c0)=0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x6c, &(0x7f0000000040)=@sack_info={r1}, &(0x7f0000000100)=0xc) 13:52:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:52:34 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) unshare(0x4000400) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) 13:52:34 executing program 2: r0 = memfd_create(&(0x7f0000000140)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='#! ./file0\t'], 0xb) write$P9_RLERROR(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0e"], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:52:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000100)) 13:52:35 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{0x0}, {&(0x7f00000003c0)="d3", 0x1}], 0x2) 13:52:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) r3 = dup3(r2, r0, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000200)={0x0, 0x729}) write$UHID_INPUT(r3, &(0x7f0000000540)={0x8, "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", 0xa00}, 0x1006) 13:52:35 executing program 3: getresgid(&(0x7f0000000040), 0xfffffffffffffffd, 0x0) 13:52:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_cmd={0x1f}}) 13:52:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x0) personality(0xffffffffffffffff) 13:52:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}]}, &(0x7f00000000c0)=0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x7c, &(0x7f0000000040)=@sack_info={r1}, &(0x7f0000000100)=0xc) [ 270.505908][T12706] syz-executor.4 (12706) used greatest stack depth: 52336 bytes left [ 270.539340][T12712] IPVS: ftp: loaded support on port[0] = 21 13:52:35 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{0x0, 0x100000}, {&(0x7f00000003c0)="d3", 0x1}], 0x2) 13:52:35 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) unshare(0x4000400) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200), 0x0) 13:52:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x10fffe) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1}) 13:52:35 executing program 4: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000000)='ip6gre0\x00') 13:52:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7}, 0x7) 13:52:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x58bb}, 0xc) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc) 13:52:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000002c0)) 13:52:36 executing program 4: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8947, &(0x7f0000000000)='ip6gre0\x00') 13:52:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0x0) 13:52:36 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{0x0, 0x2}, {&(0x7f00000003c0)="d3", 0x1}], 0x2) 13:52:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000040)=0x100060, 0xa808) 13:52:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) [ 271.468693][T12753] IPVS: ftp: loaded support on port[0] = 21 13:52:36 executing program 5: openat$dsp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dsp\x00', 0x83, 0x0) 13:52:36 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{0x0}, {&(0x7f00000002c0)='u', 0x1}], 0x2) 13:52:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}]}, &(0x7f00000000c0)=0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x75, &(0x7f0000000040)=@sack_info={r1}, &(0x7f0000000100)=0xc) 13:52:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) 13:52:36 executing program 4: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x110001) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7}, 0x7) 13:52:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0x0) 13:52:37 executing program 2: clock_nanosleep(0x2, 0x0, &(0x7f0000000600), 0x0) 13:52:37 executing program 3: syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x1a000, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 13:52:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}]}, &(0x7f00000000c0)=0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x70, &(0x7f0000000040)=@sack_info={r1}, &(0x7f0000000100)=0xc) 13:52:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) listen(r0, 0x2) semget(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) open(&(0x7f0000000000)='./file0\x00', 0x400080, 0x40) semget(0x0, 0x0, 0x80) personality(0x0) 13:52:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}]}, &(0x7f00000000c0)=0x10) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x14, &(0x7f0000000040)=@sack_info={r1}, &(0x7f0000000100)=0xc) 13:52:38 executing program 4: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffbf) r0 = syz_open_dev$amidi(0x0, 0x3800000000000000, 0x200000) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @loopback, @multicast2}, &(0x7f0000000280)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @empty}, 0x63}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000001c0)={0xffffffffffffffff, 0x657c, 0x9, r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) dup2(r3, 0xffffffffffffffff) socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) [ 273.136653][T12835] IPVS: ftp: loaded support on port[0] = 21 13:52:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:38 executing program 2: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8910, &(0x7f0000000000)='ip6gre0\x00') 13:52:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) r3 = dup3(r2, r0, 0x0) write$UHID_INPUT(r3, &(0x7f0000000540)={0x8, "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", 0x1000}, 0x1006) 13:52:38 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc1105518, &(0x7f00000000c0)) 13:52:38 executing program 5: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)={0x4847, 0xfffffffffffff001}) mlock(&(0x7f0000002000/0x2000)=nil, 0x2000) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock(&(0x7f0000000000/0x3000)=nil, 0x3002) 13:52:38 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{&(0x7f0000000200)="92", 0x1}, {&(0x7f0000000280)="f6", 0x20000201}], 0x2) 13:52:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000100)=""/49, &(0x7f0000000140)=0x31) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0x6) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) 13:52:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) request_key(0x0, 0x0, &(0x7f00000007c0)='\x00', 0xfffffffffffffffe) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000100)=""/49, &(0x7f0000000140)=0x31) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0x6) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=""/244}) 13:52:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000b9000000b2e8cbc8980d1945ae14a3172422fecd9bb2cb2ba1150209ba97e58ce4a3996443c729cb6540b5b135993cf308ff8cf2f6bef84e7baa809aab5cfa3bfa3074b3753363fcd8f351956478ca49f99a05d3325f3a8ca7ab68b2db5d"]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff67}, 0x70) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:52:39 executing program 4: r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001900d927e65de087185082cf162407eba06ec6a86e8f32e00586f9835b3e00009148790000f8de84c548", 0x2e}], 0x1}, 0x0) ioctl(0xffffffffffffffff, 0x400, &(0x7f0000000140)="f69a5d040d5d248d811fdb12ede8854e0c2cf947b0602d2ba2488aa4d30101d838c9654cef10aa79e12776cbf5d8e2d6afec9d0a0e23db9abd264fb0aa3b3e361bacc82b9ad9cd094e70126f00de81da94b8b4ed8ecded213f2ccf3370ac2247a93a415eddc0bbbb5f52aad17d3120cbdbcfc59a58d78edc5b719669f5ec0f1f0928584039847d05fface58dbfc236d2593ed04b49b416f30e1a4f2ce717a4084961f534b97b6553c8afda3d4a5a6ae3acac") 13:52:39 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) request_key(0x0, 0x0, &(0x7f00000007c0)='\x00', 0xfffffffffffffffe) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x6) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) 13:52:39 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{&(0x7f0000000200)="92a9a21b20572da8471e8a0a058959b0e021b187d98bf226995ee285b66f4cd30c7005e2383afbc4e090d1fb2c87581d96c52ea3c6b837c522fa93dcbd54ce2393b2e335bcad5f1a4f0a7ebb6505c342f020fe2662303b92d471", 0x5a}, {&(0x7f0000000280)="f627d17a0af29fad2affda27072aced388df", 0x12}, {&(0x7f00000002c0)="75ed", 0x2}, {&(0x7f0000000300)="43bc2f0efc7e276489999145553fb51863117629e717d726fc53d311260d789795ab4fb64ded82989f2ea2e8a71ac7b066bbe56f62ff999eed0a78c4f1174b093033faa0b5df1fa15b601a64e45758a8f7eb2f841791efdb3ab85178cf42ddd15e08789e7a2d33eb69cdccd66d555ef32dc344fe7f8ddd6f42bb4358634cf5fea812298706db8002cf7dbe1541a652819d88d0d1c6283f23dda3b0bb90659877d2cc9ba3e676b0", 0xa7}, {&(0x7f00000003c0)="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", 0xec8}], 0x5) 13:52:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)={0x4847, 0xfffffffffffff001}) mlock(&(0x7f0000003000/0x2000)=nil, 0x2000) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock(&(0x7f0000000000/0x3000)=nil, 0x3002) 13:52:39 executing program 4: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$inet_buf(r0, 0x0, 0x50, 0x0, &(0x7f0000000040)) 13:52:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040), 0x4) 13:52:39 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:39 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x58e, 0x40002) writev(r0, &(0x7f0000001500)=[{&(0x7f0000000200)="92", 0x20000201}, {&(0x7f0000000280)="f6", 0x1}], 0x2) 13:52:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x2, 0x0, 0x0, 0x4}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28}, 0x20) 13:52:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @remote}}}, 0x108) 13:52:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x2, 0x0, 0x800e00515) shutdown(r1, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:52:40 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:40 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:40 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r1, r0, 0x0) 13:52:40 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000140)={{0x4, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0xfffffffffffffe5f}) 13:52:40 executing program 3: ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 13:52:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000680)=""/156, 0x9c}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000001700)=[{&(0x7f0000000080)=""/234, 0xea}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00546) shutdown(r5, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) recvmsg(r8, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)=""/178, 0xb2}], 0x248}, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r9, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r8, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r10, &(0x7f0000001880)=[{&(0x7f00000001c0)=""/83, 0x53}, {0x0}, {0x0}], 0x3) shutdown(r9, 0x0) shutdown(r6, 0x0) shutdown(r3, 0x0) 13:52:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000001180)=""/4096, 0x264, 0x6, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r3, r4) setsockopt$sock_timeval(r3, 0xffff, 0x1006, &(0x7f0000000040)={0x0, 0x10001}, 0x10) shutdown(r3, 0xa3fe0c5b8f8ed894) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) 13:52:40 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:40 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x2, 0x0, 0x800e00515) shutdown(r1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x50, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:52:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:40 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:40 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:40 executing program 5: 13:52:41 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:41 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 13:52:44 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 13:52:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) close(r0) 13:52:45 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:45 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) 13:52:45 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 13:52:45 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:46 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) close(r0) 13:52:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:46 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) 13:52:46 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 13:52:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) close(r0) 13:52:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:47 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) 13:52:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) 13:52:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:48 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 13:52:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:49 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) close(r0) 13:52:49 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:49 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 13:52:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:49 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) close(r0) 13:52:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:49 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) close(r0) 13:52:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:50 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 13:52:50 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:50 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 13:52:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:50 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, 0x0, 0x0) 13:52:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:51 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, 0x0, 0x0) 13:52:51 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:51 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, 0x0, 0x0) 13:52:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c", 0x18) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:51 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:51 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) 13:52:51 executing program 2: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:51 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:52 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:52 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc09", 0x1c) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:52 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) 13:52:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) 13:52:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:52 executing program 2: mknod(0x0, 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:52 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:53 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffffffff, 0x0) close(r0) 13:52:53 executing program 2: mknod(0x0, 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:53 executing program 1: 13:52:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:53 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:53 executing program 1: 13:52:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52", 0x1e) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:53 executing program 2: mknod(0x0, 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x2c6) syz_emit_ethernet(0x213, &(0x7f0000000180)={@random="cd38ffe40f97", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x40000000003a, 0x43ff, @ipv4={[0x28], [], @broadcast}, @mcast2, {[], @icmpv6=@mld={0x87, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 13:52:53 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:54 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffffffff, 0x0) close(r0) 13:52:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:54 executing program 1: r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xd0fb) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000}, 0x1c) sendmsg$tipc(r1, &(0x7f0000001540)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x0, {0x0, 0x4}}, 0x10, 0x0}, 0x4000040) 13:52:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:54 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:54 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:54 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:54 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000080)={'batadv0\x00\x00\x00@\f\x00', @ifru_settings={0x1, 0xea01, @fr_pvc=0x0}}) 13:52:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7", 0x1f) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:54 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:55 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffffffff, 0x0) close(r0) 13:52:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:55 executing program 1: 13:52:55 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:55 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:55 executing program 1: 13:52:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:55 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) 13:52:55 executing program 1: 13:52:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:56 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) close(0xffffffffffffffff) 13:52:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:56 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x2, 0x0) 13:52:56 executing program 1: 13:52:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:56 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:56 executing program 1: 13:52:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:57 executing program 1: 13:52:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:57 executing program 1: 13:52:57 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) close(0xffffffffffffffff) 13:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:57 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x2, 0x0) 13:52:57 executing program 1: 13:52:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:57 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:57 executing program 1: 13:52:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:58 executing program 1: 13:52:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:58 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) close(0xffffffffffffffff) 13:52:58 executing program 1: 13:52:58 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x2, 0x0) 13:52:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:58 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) 13:52:58 executing program 1: 13:52:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:58 executing program 1: 13:52:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:58 executing program 1: 13:52:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:59 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:52:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:59 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 13:52:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:59 executing program 1: 13:52:59 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) 13:52:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:59 executing program 1: 13:52:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:52:59 executing program 2: 13:52:59 executing program 1: 13:53:00 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:00 executing program 2: 13:53:00 executing program 1: 13:53:00 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000640)={0x14}, 0x14) r1 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r0, 0x0, r1, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(0xffffffffffffffff) 13:53:00 executing program 1: 13:53:00 executing program 2: 13:53:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}], 0x1, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:00 executing program 2: 13:53:00 executing program 1: 13:53:00 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:00 executing program 1: 13:53:00 executing program 2: 13:53:01 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:01 executing program 1: 13:53:01 executing program 2: 13:53:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:01 executing program 1: 13:53:01 executing program 2: 13:53:01 executing program 4: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:01 executing program 2: 13:53:01 executing program 1: 13:53:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {0x0}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:01 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:01 executing program 2: 13:53:01 executing program 1: 13:53:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:02 executing program 2: 13:53:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:02 executing program 4: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:02 executing program 1: 13:53:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:02 executing program 2: 13:53:02 executing program 1: 13:53:02 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:02 executing program 4: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:02 executing program 2: 13:53:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:02 executing program 1: 13:53:02 executing program 1: 13:53:02 executing program 2: 13:53:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:02 executing program 4: mknod(0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:02 executing program 2: 13:53:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 5: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:03 executing program 1: 13:53:03 executing program 2: 13:53:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 4: mknod(0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:03 executing program 1: 13:53:03 executing program 2: 13:53:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="8405000000000000", 0x8}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 4: mknod(0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:03 executing program 1: 13:53:03 executing program 5: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:03 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 1: mknod(&(0x7f0000000000)='./bus\x00', 0xffe, 0x0) execve(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) 13:53:03 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(0x0, 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:03 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:03 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) mq_open(0x0, 0x800, 0x1a0, &(0x7f0000000200)={0x101, 0x3, 0x1000, 0xc20, 0x0, 0x3f, 0x641a, 0x4}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r4 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, 0x0) 13:53:04 executing program 5: mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645", 0xc}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 5: mknod(0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:04 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(0x0, 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090368fe07002b00000000430a0014000200450001070300001419001a00120002000e0001000ae000"/57, 0x39}], 0x1) 13:53:04 executing program 5: mknod(0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 13:53:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) close(r0) 13:53:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c", 0xe}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:04 executing program 5: mknod(0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:05 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(0x0, 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:05 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) close(r0) 13:53:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:05 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(0x0, 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 13:53:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:05 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) close(r0) 13:53:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x1, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:06 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:06 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:06 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(0x0, 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:06 executing program 1: write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:53:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:06 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) [ 301.722582][T14159] kvm: emulating exchange as write 13:53:07 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:07 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:07 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(0x0, 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0xb726) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x44003) io_setup(0x479, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000140)="f9", 0x1}]) 13:53:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 2: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000380), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(0xffffffffffffffff) 13:53:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090368fe07002b00000000430a0014000200450001070300001419001a0012000200030001000a000300"/57, 0x39}], 0x1) 13:53:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 2: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000380), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(0xffffffffffffffff) 13:53:07 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) syz_emit_ethernet(0x93b7a270ab3765c, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x44, 0x10}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2db, 0xc03]}) 13:53:07 executing program 2: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000380), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(0xffffffffffffffff) 13:53:07 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:07 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090368fe07002b00000000430a0014000200450001070300001419001a00120002000e0001000a00010e000000000000000000", 0x39}], 0x1) 13:53:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:08 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:08 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) close(r0) 13:53:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:08 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:08 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:08 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:08 executing program 1: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000080)) 13:53:08 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:09 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x1}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:09 executing program 1: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100000000000000) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="4ef27f454c4600000033006c0000000000000000442305030000000000380b00e00000000009000400"/55], 0x70) 13:53:09 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x30f}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:09 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:53:09 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x2, 0x0, 0x800e00515) shutdown(r1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000100)={0x0, {{0x10, 0x2}}}, 0x90) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:53:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:09 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:10 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:10 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'nr0\x01\x00', 0x4000007132}) write$cgroup_subtree(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff078aa174cd2ed7e08f93dd86dd"], 0xe) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 13:53:10 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff02030000fffffff000000000000001e000000100000000000000000000000000000000000000000a003e0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eb00"/112], 0xb8}}, 0x0) 13:53:10 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, 0x0, 0x0) close(r0) 13:53:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:10 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) poll(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000340)={@empty, @remote}, 0x0) r3 = open(&(0x7f0000005cc0)='./file0\x00', 0x0, 0x108) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00'}) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000400)={@empty, @initdev}, &(0x7f0000000440)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000048c0)='IPVS\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006240)=[{{&(0x7f0000000480)=@xdp, 0x80, &(0x7f0000000680)=[{0x0}, {0x0}], 0x2}, 0x8001}, {{&(0x7f00000006c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/125, 0x7d}, {&(0x7f00000008c0)=""/85, 0x55}, {&(0x7f0000000940)=""/10, 0xa}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/6, 0x6}], 0x5, &(0x7f0000000c00)=""/144, 0x90}, 0x1}, {{&(0x7f0000000cc0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001e80)=[{0x0}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x2, &(0x7f0000001ec0)=""/30, 0x1e}}, {{0x0, 0x0, &(0x7f0000003080), 0x0, &(0x7f00000030c0)=""/175, 0xaf}, 0x4}, {{&(0x7f0000003180)=@pppoe, 0x80, &(0x7f00000033c0)=[{&(0x7f0000003200)=""/202, 0xca}, {&(0x7f0000003300)=""/59, 0x3b}, {&(0x7f0000003340)=""/112, 0x70}], 0x3, &(0x7f0000003400)=""/73, 0x49}, 0xfffffffffffff6c1}, {{&(0x7f0000003480)=@nfc, 0x80, &(0x7f0000004880)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004580)=""/119, 0x77}, {&(0x7f0000004600)=""/206, 0xce}, {&(0x7f0000004700)=""/99, 0x63}, {0x0}, {&(0x7f00000047c0)=""/191, 0xbf}], 0x6}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000006100)=[{&(0x7f0000005f40)=""/90, 0x5a}, {0x0}], 0x2}, 0x749f}], 0x7, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0xd}}, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000065c0)={&(0x7f0000006440)={0x14, 0x0, 0x204, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000045}, 0x20044000) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7e001c665246b21b0dd6f71d81e790c64ba5985709e4205abf7dd45c0ea184f602d7052a56bd65e8370d8c38567c87593dae0e5a6259a6133ac34580ff1037a070a327ce88f6217def"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}}}, 0x30) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x39461400) 13:53:11 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(0x0, 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:11 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, 0x0, 0x0) close(r0) 13:53:11 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) poll(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000340)={@empty, @remote}, 0x0) r3 = open(&(0x7f0000005cc0)='./file0\x00', 0x0, 0x108) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00'}) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000400)={@empty, @initdev}, &(0x7f0000000440)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000048c0)='IPVS\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006240)=[{{&(0x7f0000000480)=@xdp, 0x80, &(0x7f0000000680)=[{0x0}, {0x0}], 0x2}, 0x8001}, {{&(0x7f00000006c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/125, 0x7d}, {&(0x7f00000008c0)=""/85, 0x55}, {&(0x7f0000000940)=""/10, 0xa}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/6, 0x6}], 0x5, &(0x7f0000000c00)=""/144, 0x90}, 0x1}, {{&(0x7f0000000cc0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001e80)=[{0x0}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x2, &(0x7f0000001ec0)=""/30, 0x1e}}, {{0x0, 0x0, &(0x7f0000003080), 0x0, &(0x7f00000030c0)=""/175, 0xaf}, 0x4}, {{&(0x7f0000003180)=@pppoe, 0x80, &(0x7f00000033c0)=[{&(0x7f0000003200)=""/202, 0xca}, {&(0x7f0000003300)=""/59, 0x3b}, {&(0x7f0000003340)=""/112, 0x70}], 0x3, &(0x7f0000003400)=""/73, 0x49}, 0xfffffffffffff6c1}, {{&(0x7f0000003480)=@nfc, 0x80, &(0x7f0000004880)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004580)=""/119, 0x77}, {&(0x7f0000004600)=""/206, 0xce}, {&(0x7f0000004700)=""/99, 0x63}, {0x0}, {&(0x7f00000047c0)=""/191, 0xbf}], 0x6}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000006100)=[{&(0x7f0000005f40)=""/90, 0x5a}, {0x0}], 0x2}, 0x749f}], 0x7, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0xd}}, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000065c0)={&(0x7f0000006440)={0x14, 0x0, 0x204, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000045}, 0x20044000) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7e001c665246b21b0dd6f71d81e790c64ba5985709e4205abf7dd45c0ea184f602d7052a56bd65e8370d8c38567c87593dae0e5a6259a6133ac34580ff1037a070a327ce88f6217def"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}}}, 0x30) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x39461400) 13:53:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:53:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000500)=""/208, 0x324}], 0x1, 0x0, 0xffffffffffffffdc}}], 0x1, 0x0, 0x0) 13:53:11 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:11 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, 0x0, 0x0) close(r0) 13:53:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:53:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:53:11 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) poll(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000340)={@empty, @remote}, 0x0) r3 = open(&(0x7f0000005cc0)='./file0\x00', 0x0, 0x108) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00'}) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000400)={@empty, @initdev}, &(0x7f0000000440)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000048c0)='IPVS\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006240)=[{{&(0x7f0000000480)=@xdp, 0x80, &(0x7f0000000680)=[{0x0}, {0x0}], 0x2}, 0x8001}, {{&(0x7f00000006c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/125, 0x7d}, {&(0x7f00000008c0)=""/85, 0x55}, {&(0x7f0000000940)=""/10, 0xa}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/6, 0x6}], 0x5, &(0x7f0000000c00)=""/144, 0x90}, 0x1}, {{&(0x7f0000000cc0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001e80)=[{0x0}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x2, &(0x7f0000001ec0)=""/30, 0x1e}}, {{0x0, 0x0, &(0x7f0000003080), 0x0, &(0x7f00000030c0)=""/175, 0xaf}, 0x4}, {{&(0x7f0000003180)=@pppoe, 0x80, &(0x7f00000033c0)=[{&(0x7f0000003200)=""/202, 0xca}, {&(0x7f0000003300)=""/59, 0x3b}, {&(0x7f0000003340)=""/112, 0x70}], 0x3, &(0x7f0000003400)=""/73, 0x49}, 0xfffffffffffff6c1}, {{&(0x7f0000003480)=@nfc, 0x80, &(0x7f0000004880)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004580)=""/119, 0x77}, {&(0x7f0000004600)=""/206, 0xce}, {&(0x7f0000004700)=""/99, 0x63}, {0x0}, {&(0x7f00000047c0)=""/191, 0xbf}], 0x6}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000006100)=[{&(0x7f0000005f40)=""/90, 0x5a}, {0x0}], 0x2}, 0x749f}], 0x7, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0xd}}, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000065c0)={&(0x7f0000006440)={0x14, 0x0, 0x204, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000045}, 0x20044000) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7e001c665246b21b0dd6f71d81e790c64ba5985709e4205abf7dd45c0ea184f602d7052a56bd65e8370d8c38567c87593dae0e5a6259a6133ac34580ff1037a070a327ce88f6217def"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}}}, 0x30) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x39461400) 13:53:11 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, 0x0}, 0x0) close(r0) 13:53:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:53:12 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(0x0, 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:53:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:53:12 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, 0x0}, 0x0) close(r0) 13:53:12 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) poll(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000340)={@empty, @remote}, 0x0) r3 = open(&(0x7f0000005cc0)='./file0\x00', 0x0, 0x108) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00'}) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000400)={@empty, @initdev}, &(0x7f0000000440)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000048c0)='IPVS\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000006240)=[{{&(0x7f0000000480)=@xdp, 0x80, &(0x7f0000000680)=[{0x0}, {0x0}], 0x2}, 0x8001}, {{&(0x7f00000006c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/125, 0x7d}, {&(0x7f00000008c0)=""/85, 0x55}, {&(0x7f0000000940)=""/10, 0xa}, {&(0x7f0000000a40)=""/220, 0xdc}, {&(0x7f0000000b40)=""/6, 0x6}], 0x5, &(0x7f0000000c00)=""/144, 0x90}, 0x1}, {{&(0x7f0000000cc0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001e80)=[{0x0}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x2, &(0x7f0000001ec0)=""/30, 0x1e}}, {{0x0, 0x0, &(0x7f0000003080), 0x0, &(0x7f00000030c0)=""/175, 0xaf}, 0x4}, {{&(0x7f0000003180)=@pppoe, 0x80, &(0x7f00000033c0)=[{&(0x7f0000003200)=""/202, 0xca}, {&(0x7f0000003300)=""/59, 0x3b}, {&(0x7f0000003340)=""/112, 0x70}], 0x3, &(0x7f0000003400)=""/73, 0x49}, 0xfffffffffffff6c1}, {{&(0x7f0000003480)=@nfc, 0x80, &(0x7f0000004880)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004580)=""/119, 0x77}, {&(0x7f0000004600)=""/206, 0xce}, {&(0x7f0000004700)=""/99, 0x63}, {0x0}, {&(0x7f00000047c0)=""/191, 0xbf}], 0x6}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000006100)=[{&(0x7f0000005f40)=""/90, 0x5a}, {0x0}], 0x2}, 0x749f}], 0x7, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0xd}}, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000006600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000065c0)={&(0x7f0000006440)={0x14, 0x0, 0x204, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000045}, 0x20044000) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7e001c665246b21b0dd6f71d81e790c64ba5985709e4205abf7dd45c0ea184f602d7052a56bd65e8370d8c38567c87593dae0e5a6259a6133ac34580ff1037a070a327ce88f6217def"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}}}, 0x30) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x39461400) 13:53:12 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:12 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, 0x0}, 0x0) close(r0) 13:53:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 13:53:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:53:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 13:53:12 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r0) 13:53:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:53:13 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(0x0, 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:53:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r0) 13:53:13 executing program 1: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:53:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:53:13 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(0x0, 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:53:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:53:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r0) [ 308.532365][T14478] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:53:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:53:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80), 0x0, 0x0, 0x0) 13:53:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:14 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:53:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:53:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:14 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(0x0, 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1700000055000d228a3d0000fc07ff1b070404000d0000", 0x17) 13:53:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(r0) 13:53:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1700000055000d228a3d0000fc07ff1b070404000d0000", 0x17) 13:53:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:53:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:53:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:53:15 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(0xffffffffffffffff) 13:53:15 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:53:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1700000055000d228a3d0000fc07ff1b070404000d0000", 0x17) 13:53:15 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(0xffffffffffffffff) 13:53:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:53:15 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(0x0, 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000100)="1700000055000d228a3d0000fc07ff1b070404000d0000", 0x17) 13:53:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:53:15 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) 13:53:15 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0xfffffffffffffef1, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f7fffffff0000580f02000000003f420f00000000ee856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) close(0xffffffffffffffff) 13:53:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)}}], 0x1, 0x0, 0x0) 13:53:15 executing program 1: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)=""/178, 0xb2}], 0x1}, 0x42) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001880)=[{&(0x7f00000001c0)=""/83, 0x53}, {0x0}], 0x2) shutdown(r2, 0x0) 13:53:16 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000240)={0xa, 0x4e22}, 0x1c) 13:53:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:53:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 13:53:16 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:16 executing program 2: socket(0x1d, 0x2, 0x0) [ 311.269258][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x2, 0x0, 0x800e00689) shutdown(r1, 0x0) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:53:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 311.421952][T14604] can: request_module (can-proto-0) failed. 13:53:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fa873d411962ff4c9801c2841fc093a52a7d1", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='h', 0x315}, {&(0x7f0000000180)="840500000000000000521645815c8a", 0xf}], 0x2, &(0x7f0000001600)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 311.500217][T14604] can: request_module (can-proto-0) failed. 13:53:16 executing program 2: r0 = msgget(0x3, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x0, "39657847952b7f404c8acc039f1988fe70d69d7ce4459f2224cc0d54c1426122c7c17618f8aff6f6e31b908dad4d434b8896d27003fd3384c8ddf5fd4817bc887e7c326025e835d0bc50535b3866eff905e4b22106d49493b81c0ed9c1c5191d62bea42dd50852a2859b4e5d6baaf343ab1330b144b87e1be2188f8a6943a0bfcc16d20920d8dbd99c6261ffa1f01e3fc074d3384b3bf53c169bde6679195ccb02ab0384cbb5f94d0568d73d0ac223a3b5e310423a61d321885df8c6077ca6033ae71f62f59f7ff194c25b56451e8ab5"}, 0x4bc, 0x23e44fd3fc9be0c6) 13:53:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x1) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:53:16 executing program 1: 13:53:17 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000080)=""/97, 0x61, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) 13:53:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000025000000450000002000000019000a001400000007fd17e9ffff0606040000000000000000", 0x39}], 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ff6000/0x7000)=nil, 0x7000, 0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000440)) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="2b7069647320ac35bbc8b674c75ed2b2fae4776753118d97da19cefd8001000000000000966f55b19bd58a81add9c90a289c766be2f69a55eb0d7f85222f5989a0839f4899674a3ec541b0c8941d1333138c1d1b651d02ac3d6cf014a85b628362f724f334c90e14d685a3fe828da0cfb3"], 0x6) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) 13:53:17 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 13:53:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) statfs(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) syz_open_dev$admmidi(0x0, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00', @ifru_flags}) 13:53:17 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) [ 312.167088][T14645] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 312.176481][T14645] batman_adv: batadv0: Adding interface: veth0_to_hsr [ 312.183379][T14645] batman_adv: batadv0: The MTU of interface veth0_to_hsr is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.209196][T14645] batman_adv: batadv0: Interface activated: veth0_to_hsr 13:53:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000080)=""/234, 0xea}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00546) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)=""/178, 0xb2}], 0x1}, 0x42) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r6, &(0x7f0000001880)=[{&(0x7f00000001c0)=""/83, 0x53}, {0x0}, {0x0}], 0x3) shutdown(r5, 0x0) shutdown(r2, 0x0) 13:53:17 executing program 3: getpid() sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:53:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) r3 = dup3(r2, r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) write$UHID_INPUT(r3, &(0x7f0000000540)={0x8, "7838ad4a3fba1441522d0da67a8774fe27a24f16891a00f1a179cc5747fdf90d0f655dd879b5be832d0320cb011915597d7d811fa33132b73c33caa36543cd1a4d138f43c843432faab8e7817e4e468b7b08ca5f369679555b7cf2d8423b13a93dd16011413329a52b884ddbf9d8f1b63c57185428b89452eb253f5cf45b1de66f02dc6d666a90c0045adcc03fc580077eebbeca35f85639181341f7e5c0bd6bfd5b927dfcc6338b5057ec599edb536c8eadd5e938c338a9e800a78e23b5f2f66d90f8e045837f03935f050ab64eeb1fac84f68fb06ace224d6d00f1c83cde671e702a458873b69ead3c1e0a329668d1810ad0b0e851b7027514b198fec8a6231192de9b6abe8f20fb20e89ac0b8093529e946b4f615865d49cce25d20d8801c39369bcf94a3e339100a1ad90f2b9a53f22f60cfefed7868840195f6966853ac7b10314f53f07704df801a1ed540b318c76fd7ed7b4919f4236d9a0a64562b1a8def53b6e240449b6fca75159db048ed2765f9e88b44087d7beb915448aae673bc929af26eec7ecfbf05f0a4409ca4e507a4125141a3fde48e6de855a0ebdc567ebea0840d305756700fd55cc43b0bbac7480ecd99e4155cd32eb7073372aed5c74366f20421346b9580c9a3bfe1254de658279e6b1910b5f5513815f36789801056967f8f6d64d272ff7c7135ed692c0eec7cd3a21d258a23b4572672bf95acae557c81fb45162fa33e8b6d29d82ded12df4c110fa2ecc23ed954b6e308a0fca41c409cf0e71852f13e36b1152a90cabdae1efb29071d7a1284dce024bb95328d75d406c60df031f5d137f5f3b142c20a1e97ed78c2aa43646f71e9b3e7702b5175ba17a88f8a6c2231141592d85453bddc05dcd1e232e5153b22bd1296bd5752853d729e49c736819cb7926d5d0463f03db23d24a0a4bb038aa855e70db6f1f897e8db9485d2a79c76ef67a4e676575e491dd71a8686b2d263e81898d8e5498b28595001c28941e52009b0df2528ea2cdf988fab98731f90d4dcbeffddc79550c2c58e09fcd91410d11277db736f076ccf20cc77e6a67de6b4f66231f3586787a16a799ad5a876e20f0df602c52b245a833fb54534effe304bccaf231bcf9a7d0bbf92948fa5802243e30b05ce274c809babf007be0a66c0f12fffedf391ae3ae8f3a76fe0a6cbb6308e0f768d8d163c5e25bd587e106546a66a35be99d45455e9b902ac07e3a5644d0932a2bd1c9a159729b02c2eecd438048e35ed12f58e8a58ab9a7fb51c42f02f1531e8adeab087b2552d6017b24c3717934efac1097f73218d052e9ba4833b1da97d959a267e61d0846325ae7af615378153bdcf010347b100ff185f22f67c487885c8e0c50cae8511e5950940052c7674525bc598e47dc7d2067c2a68332580781d5ba3c2cf396214073106e06882f927b263b7caedc50d532efdcf3c178cbb10bb9d3dad20b0966f035daf327ca499164168b19af368c17643d6799f847ffaee8c904869b6f3a5a92baca5459ad15b59d7728e4f38a3171b3b5d6c917c653c6265ec5720a09ab7bb95c4946ac97f0e5700cf0c393c6cb9e020036eaeb4a3d214930eeb87e733a2fbc9a498ca227eb803ec3a42b9c1b656341a984581dd126fb5a45f7dddb33ca854d5a29c2f2fc6cd0f3aed7edf78255cb91b3b5048a71d6e0c86ff3d84149d0b0e05c8d8df09f2ad075c6406c677f31be72df3af1b9c27294c132c1223bee04d8ed1e24a4537319e058a1c86381891ecf8b02f5c3fc2a2e308e2af602988222f04f6a720e56bbecdd65f2a1195bb66213ea88d03ae7ddf7160cb99d90f2937e3e56eb483820e7b75d3a8948386394909e770c6e7f0189cae4af666909cc7d2005122dc49992f585cb8ed6957deb979b933b32885ba566ce3d3344be196bb07c3e3922104e977305c9e945845bea8420530566b6d0a4cd98d0459c6fb3193bfab6e2555f26ddeff708138aedd8505f2f33490594a19ed6562c309bb628f3a5d62473bd9a2ab41cf426ea397f12b179b2f4fc3b54868e56055dc86c77a951cd64b1a129a4cb58f4e87a4ca1fd491dafe570ebb0dac7e4456fce0a91981a1dc0e1dcc145bdf8453a0b55f3a2622a1ad178be70e86fe8d356647d0ee370736bfcae71a58c7e1a977d9353103a4b9df9daab03533924ca42189674a6cfa5090f68bea85635708f9c3b560c51e9b9bdd57da37e2fdcdd679fe57f3fb9c89598f35be5bef7c7a07ed1d8e1100a6bbff75198ea507cd4c447dbeafd17913912b26181c8dc064b908ee3d4f939536ec15cf5bc85bf1e0625d1c753241183cd105666e3fb1098e059ee9afe6efcf6c0b61ee995536ef449ff477edd8eefc1181179478aa9c1fe0359fe5ea49bf3a36970b9b3251789da4a76a1e117e32a75bfab891c6cf57c514582011e7f4b756ab9300b602d6b76c1d8048015962631bb2b5a7bcc57cf921b254d8cefdfc5ae91becd342573243376459dcbd97c35659beb703d5dd566b6189abb62d54027581bd6c177f5c1b840256a91089c6e5e6bb314028cd7da8b9b5fe0b715597cf91c4af73c0c884117317781372a521ed0273f131be59bda46908c448130eab9d5c7e1722c1712121b70b1ed9baca8f0196f3b006e4879849939baeee31b03b8c8630a42526e68d3a5b364e686786cdaeaf5e2f10fc3e063eadc9a664e46c97eb06e9acbf583fb0782621cf76f6b6865e30e636fda728c199a658cb8e3924d04991dc66695fd10d31de504766f0f551cd1cf485172dc6a2f6340bbfa990e14f6e1dc6ffa1b860d4cb00ad3082636cea75f8111da6c49476ae44ddc110ee2600c9e39bc9903bacafb8b0897afd6dc53460c063a47e7b0ea0ba797e1007041e8cd932f9f1afe31b710da62f17d2139b8ea9defb4838013455a836969ca25ea0d84e89b0db06d203cbd4b674c3aa8ab6ab94af3bde30149dd7a1dd87735897c646d64d3c9914d26c71498b778fc3d54874f26e4ab51e59813c083c0fd3ff8231a3c4339a9869e58232487fc62dfa93533aa3d6f22bf5b61c7278bfbe8d56622b3b2d74cefacaed53193d21ab977ddde3c38be6a373064f8dfe0b67a39bd7631444975ed7a13573c0b766a073a4100bf8d4a1c3a56d929077ed9bf2430950542d45e46353e19be7898ffde7156d1cc60614908659980507279f85d58eb3ce6c1253da44641c7e945de9ac9d887cb687dbffeec6f51ce124b4574bd891bf19e2570ff39af6fbb019ae5f18571e267b26169cbe818df3a941aaeac9d2ba8737e3fa8f45ff8a8e49ee040a0d145317e5a3b8023b693c6683c2977fc4f669c89b7887b2057dcb27b2736bd01ad942e150152e899c300bf49deaafc2ddab152245f1294ae9742cb7cd9db69dc10b92b8e3894916898064dbc136632aebfe7dd29f502a22cb678565ecbd3a2ee59038d100fb83193da166ffb924abf78346e6f4aa8b89811f09fec6357871afb517867c55a1f215db8b0edd86bc0c0a4a014f62d6c147845ad167ca94791db148d141ab71d622dcf5439264dddaedc83dc78e7951895df11a7a3319f145b8a0c5a6a404aa85f27084c17a62c3a755f790056817b6da582590ca2c5e7cb232e6359b1ff7af0f34252be8200e2876bca4942416c8b65c7584b985802fac091576ea77033deaa4ce7088571c3053dd65b24eead664060ca482e5d633cca12f7150304e70673561ade773692249a3c013264a99ea49e66ea208bc9521bbd7b85bbd680cc2e735e17fd329e5bc64b901f35ed358a83417836197a03a5c6aadc40138e15fc1285c55fbbfd10646b5798994dc0b6d039069c6415a667a3b7ad12595f583fad5a9c9f3ff7cef6abf1c1fb6b479ebc4ea86fe8645b748752377c308ee5589112e49f529fbea5a4cfd5c81b0eb9571075f970e9d114f50c33e5d5131f42beae95f0c57354ce9d8bded3a697e43c40869427c68bfc989cf5b62afd5845fbb9703aa7823aeaef9e83638beeff3a0cdd978a56f4cdc5419887fc9bcf5b206b98caa91338ebd70060b131d8637d4a99a4b792bd2a9fdf7a9b4ed749bc5b0c7114fd7678cece20b9348dbf314f15686bd29c20d8a498c70a0816964d263511f2c7d68bf656ffc0b60894989cbfc81a225902393facb3071c5d3b4740553bd0c0173276f8dd8d0859c01dda0df2d4544c62e4b275ca1e408013c9c2ef829e559afb54d4e54a59850de8a726ed86480e872a0991c1a9bf33de9f01b218cbad65375857d7dce0f479dce38ad51e5ae2633da5307e4cd99204bc752e0b2e919bbded125a9d95f9392b74ff1b6c2f781fd297771d0dd0997e1b66cf2d68322b2da2df8dc8ee5971d5ad4a515de39e96ce18faabde66680396a3308cb5001cc380ca5e89f1a2317466fb9495d1be3a797e37a44811a23e3bcecaf8b803e2c0ecbef746f41f07ed6579b6d7c6a2f4f38431ba75716b8ef1d6644079c5d753a6fc6243cbb5948babd9a7eb19c89a2788c491ff5b450943175c2e580c5e50a7936d512f78d9d93607e9e9aa0f91df0e5c7e3b86f5beb498c76997c526b7334aa420f9e9674159eb25cbd4ecb7b6a5fe5d1b83c0ba3489f9634c348a00c73ac2d4590c03e507e628151fc1ac767cfad80db8eae3427cd2db2955170df3e099418ffa9b05e14391530402395df1dce98962c72ae97ea3f29394326d5ec1ec92c31931c16f2ad72467aa7fc975da5d7b1f2a3d9665419bdc614e41e63121d1b3956fcf25b3619bbeb305baa35558e55c8ac827d23a216f0feb132b558be0a0c9b7835d88b0e642de0267b1809d587496e78968d0fb37cd8836ce69521253dd7cddf25bda2d73f5bc03112cc143df0d29634296366f21533feb8069aef973a1b525e6d3f50d9825ee2c7c03333eb8bd80391b00a7ead4207c8660a7b964355e6918baa77abcabf3252d57858a50f9a4667489c98955bbf362229fce92eef4de5cf314822d769890c07050631cea82a56fd772ac733e5ce74125c4c826de09a1b43b3d3989aafa84f3dbb8a65d70de01ba9744544ee778d606072d2242b971cb9fc90bf11cc5d4d378d7edfdb76b3779037049514048992468e61159b3a814ec1f93dad7a2ddcd9963a94232cbc324aca6c1e042326358a209fb9ca7cf6fca76e07b1c63d5cf5c8bfc95e45c46ca7b0c0cf92fa3201037f350aeabe5cce75c85dcd902a70bb078f0bbe1b8a416ac73b1b10b74b064c4c9426c2416b7dff1d0841d4636c35084f912f5716fe755339f455fff9f551b9945a9d82c684ace2be6bca05125d9f7fedef32859ebea5e912ae8436cacfc61e03e17722703cbd60426d1080d70ec0d451b408f0e0c47a9aca78ef5d5c7b68188cb91d3d7dc7ebb1938e34cf334c3dbfc08261d590fbe62267fd8b000a978b07f59bf1dbb35507b7428014c5eb83e4db628c2c12bd3020f0a7027b9fcd48fc1d70a6edcec241277c822624be7d9456525507f5c7e05e3062a250fc41d4cc5caf54aa0748cfe6930bfb3bdfe36bc8b5823b6fa051e0dd605c13ca3f04342375d54734f2f90c841ab18b71dcf262af1125ae75c6afb1e755ba744d7950716a91c4d4c5561fa239ed5487e274710daaa73d65087f561deca0d28d73d0ed56e090d81f4090e18acb56345d468fce34d2815f1ec13ac3fddf8d826908d9439ba06c53fbc5729f6c34e0cb26e97c635b87719d5e5fa2a8343c51fb51140344a93a75b3e985b3c0f77ab312d4e5cb4ecb9bcb419aeb9ce5feb0fad63d6c92c67f3dcbea02c84bc8df0b912a784d8f17ab824356c728", 0x1000}, 0x1006) [ 312.339507][T14645] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 13:53:17 executing program 2: 13:53:17 executing program 0: 13:53:17 executing program 2: 13:53:18 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:18 executing program 0: 13:53:18 executing program 2: 13:53:18 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) 13:53:18 executing program 3: 13:53:18 executing program 2: 13:53:18 executing program 1: 13:53:18 executing program 3: 13:53:18 executing program 0: 13:53:18 executing program 2: 13:53:18 executing program 3: 13:53:18 executing program 0: [ 314.331692][ T7] ================================================================== [ 314.339807][ T7] BUG: KMSAN: uninit-value in batadv_iv_send_outstanding_bat_ogm_packet+0x6cd/0xcc0 [ 314.349143][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.3.0-rc3+ #17 [ 314.356562][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.366600][ T7] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 314.374382][ T7] Call Trace: [ 314.377681][ T7] dump_stack+0x191/0x1f0 [ 314.381993][ T7] kmsan_report+0x162/0x2d0 [ 314.386466][ T7] __msan_warning+0x75/0xe0 [ 314.390948][ T7] batadv_iv_send_outstanding_bat_ogm_packet+0x6cd/0xcc0 [ 314.397944][ T7] ? batadv_iv_ogm_queue_add+0x1780/0x1780 [ 314.403720][ T7] process_one_work+0x1572/0x1ef0 [ 314.408722][ T7] worker_thread+0x111b/0x2460 [ 314.413465][ T7] kthread+0x4b5/0x4f0 [ 314.417513][ T7] ? process_one_work+0x1ef0/0x1ef0 [ 314.422693][ T7] ? kthread_blkcg+0xf0/0xf0 [ 314.427276][ T7] ret_from_fork+0x35/0x40 13:53:19 executing program 4: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) close(r0) 13:53:19 executing program 1: 13:53:19 executing program 2: 13:53:19 executing program 3: 13:53:19 executing program 0: 13:53:19 executing program 5: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x8001420, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000640)={0x14}, 0x14) r2 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r1, 0x0, r2, 0x0, 0xffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) close(r0) [ 314.431660][ T7] [ 314.433960][ T7] Uninit was created at: [ 314.438170][ T7] kmsan_save_stack_with_flags+0x37/0x70 [ 314.443781][ T7] kmsan_internal_alloc_meta_for_pages+0x123/0x510 [ 314.450260][ T7] kmsan_alloc_page+0x7a/0xf0 [ 314.454923][ T7] __alloc_pages_nodemask+0x142d/0x5fa0 [ 314.460453][ T7] page_frag_alloc+0x35b/0x890 [ 314.465245][ T7] __napi_alloc_skb+0x195/0x980 [ 314.470088][ T7] page_to_skb+0x134/0x1150 [ 314.474580][ T7] receive_buf+0xe7b/0x8810 [ 314.479158][ T7] virtnet_poll+0x666/0x19d0 [ 314.483739][ T7] net_rx_action+0x74b/0x1950 [ 314.488391][ T7] __do_softirq+0x4a1/0x83a [ 314.492880][ T7] do_softirq_own_stack+0x49/0x80 [ 314.497893][ T7] __local_bh_enable_ip+0x184/0x1d0 [ 314.503096][ T7] local_bh_enable+0x36/0x40 [ 314.507674][ T7] ip_finish_output2+0x20dc/0x25d0 [ 314.512776][ T7] __ip_finish_output+0xaf8/0xda0 [ 314.517786][ T7] ip_finish_output+0x2db/0x420 [ 314.522624][ T7] ip_output+0x541/0x610 [ 314.526854][ T7] __ip_queue_xmit+0x1caf/0x21f0 13:53:19 executing program 2: [ 314.531782][ T7] ip_queue_xmit+0xcc/0xf0 [ 314.536184][ T7] __tcp_transmit_skb+0x409e/0x5c60 [ 314.541367][ T7] tcp_write_xmit+0x38d9/0xa870 [ 314.546204][ T7] __tcp_push_pending_frames+0x124/0x4e0 [ 314.551819][ T7] tcp_push+0x705/0x8b0 [ 314.555954][ T7] tcp_sendmsg_locked+0x5af9/0x6880 [ 314.561125][ T7] tcp_sendmsg+0xb2/0x100 [ 314.565444][ T7] inet_sendmsg+0x178/0x2e0 [ 314.569924][ T7] sock_write_iter+0x599/0x650 [ 314.574660][ T7] __vfs_write+0xa2c/0xcb0 [ 314.579050][ T7] vfs_write+0x481/0x920 [ 314.583266][ T7] ksys_write+0x265/0x430 [ 314.587571][ T7] __se_sys_write+0x92/0xb0 [ 314.592046][ T7] __x64_sys_write+0x4a/0x70 [ 314.596611][ T7] do_syscall_64+0xbc/0xf0 [ 314.600999][ T7] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.606857][ T7] ================================================================== [ 314.614884][ T7] Disabling lock debugging due to kernel taint [ 314.621005][ T7] Kernel panic - not syncing: panic_on_warn set ... [ 314.627568][ T7] CPU: 1 PID: 7 Comm: kworker/u4:0 Tainted: G B 5.3.0-rc3+ #17 [ 314.636380][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.646415][ T7] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 314.654188][ T7] Call Trace: [ 314.657453][ T7] dump_stack+0x191/0x1f0 [ 314.661765][ T7] panic+0x3c9/0xc1e [ 314.665651][ T7] kmsan_report+0x2ca/0x2d0 [ 314.670130][ T7] __msan_warning+0x75/0xe0 [ 314.674612][ T7] batadv_iv_send_outstanding_bat_ogm_packet+0x6cd/0xcc0 [ 314.681625][ T7] ? batadv_iv_ogm_queue_add+0x1780/0x1780 [ 314.687409][ T7] process_one_work+0x1572/0x1ef0 [ 314.692436][ T7] worker_thread+0x111b/0x2460 [ 314.697193][ T7] kthread+0x4b5/0x4f0 [ 314.701233][ T7] ? process_one_work+0x1ef0/0x1ef0 [ 314.706410][ T7] ? kthread_blkcg+0xf0/0xf0 [ 314.710976][ T7] ret_from_fork+0x35/0x40 [ 314.716461][ T7] Kernel Offset: disabled [ 314.720780][ T7] Rebooting in 86400 seconds..